Results 21 to 30 of about 7,549 (186)

Proposed Method to Encrypt Images to Mobile Device Based on the Principles of Shannon [PDF]

open access: yesEngineering and Technology Journal, 2016
In the proposed research, it has been proposed image encryption method in the mobile device based on the principles of Shannon (diffusion and confusion). Where: a large group of keys is used.
Hanna M .A .Salman, Anwar Abbas Hattab
doaj   +1 more source

Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
This paper will introduce two proposal algorithms (Snowfish 1) and the (Snowfish 2) to improve the Sosemanuk stream cipher algorithm by benefiting from the efficient properties of the Twofish block cipher and also use its key schedule, keydependent Sbox ...
Shant K. Avakian, Rana S. Mohammed
doaj   +1 more source

A New, Fast Pseudo-Random Pattern Generator for Advanced Logic Built-In Self-Test Structures

open access: yesApplied Sciences, 2021
Digital cores that are currently incorporated into advanced Systems on Chip (SoC) frequently include Logic Built-In Self-Test (LBIST) modules with the Self-Test Using MISR/Parallel Shift Register Sequence Generator (STUMPS) architecture.
Tomasz Garbolino
doaj   +1 more source

Using classifiers to predict linear feedback shift registers [PDF]

open access: yes, 2001
Proceeding of: IEEE 35th International Carnahan Conference on Security Technology. October 16-19, 2001, LondonPreviously (J.C. Hernandez et al., 2000), some new ideas that justify the use of artificial intelligence techniques in cryptanalysis are ...
Hernández, Julio C.   +4 more
core   +3 more sources

SCALABLE LOGIC BIST DESIGN AND ANALYSIS FOR ENHANCED TESTING OF COMBINATIONAL CIRCUITS [PDF]

open access: yesProceedings on Engineering Sciences
The paper introduces a scalable Logic Built-In Self-Test (BIST) approach for combinational circuits, utilizing a Bit Swapping Linear Feedback Shift Register (BS-LFSR) as the test pattern generator.
Suhas Shirol   +3 more
doaj   +1 more source

Compressive Imaging Using RIP-Compliant CMOS Imager Architecture and Landweber Reconstruction [PDF]

open access: yes, 2020
In this paper, we present a new image sensor architecture for fast and accurate compressive sensing (CS) of natural images. Measurement matrices usually employed in CS CMOS image sensors are recursive pseudo-random binary matrices.
Akbari, Ali   +4 more
core   +1 more source

Revisiting LFSRs for Cryptographic Applications [PDF]

open access: yesIEEE Transactions on Information Theory, 2011
Linear finite state machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is linear feedback shift registers (LFSRs) used in many cryptographic applications such as design of stream ciphers or pseudo-random generation.
Arnault, François   +3 more
openaire   +3 more sources

On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]

open access: yes, 2006
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa   +14 more
core   +3 more sources

Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Fast correlation attack, pioneered by Meier and Staffelbach, is an important cryptanalysis tool for LFSR-based stream cipher, which exploits the correlation between the LFSR state and key stream and targets at recovering the initial state of LFSR via a ...
Zhaocun Zhou, Dengguo Feng, Bin Zhang
doaj   +1 more source

Blind Side Channel on the Elephant LFSR

open access: yesProceedings of the 19th International Conference on Security and Cryptography, 2022
Elephant is a finalist to the NIST lightweight cryptography competition. In this paper, the first theoretical blind side channel attack against the authenticated encryption algorithm Elephant is presented. More precisely, we are targetting the LFSR-based counter used internally. LFSRs are classic functions used in symmetric cryptography. In the case of
Houssein Meraneh, Awaleh   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy