Results 31 to 40 of about 7,549 (186)
GPS-free synchronized pseudo-random number generators for internet-of-things
IntroductionSecuring wireless communications in internet-of-things (IoT) requires both generation and synchronization of random numbers in real-time. However, resource constraints on an IoT device limit the use of computationally intensive random number ...
Mustafizur Rahman, Shantanu Chakrabartty
doaj +1 more source
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core +2 more sources
Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj +1 more source
Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm
In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the confidentiality of image data holds paramount importance. This
Noor Kareem Jumaa, Abbas Muhammed Allawy
doaj
Secure Image Encryption Based on Compressed Sensing and Scrambling for Internet-of-Multimedia Things
In this paper, we propose a secure image encryption system based on compressed sensing (CS) with a scrambling mechanism. For efficient encryption, we use a sparse measurement matrix, where the nonzero elements are generated by a linear feedback shift ...
Jaephil Choi, Nam Yul Yu
doaj +1 more source
Spatial and Angular Resolution Enhancement of Light Fields Using Convolutional Neural Networks [PDF]
Light field imaging extends the traditional photography by capturing both spatial and angular distribution of light, which enables new capabilities, including post-capture refocusing, post-capture aperture control, and depth estimation from a single shot.
Gul, M. Shahzeb Khan +1 more
core +2 more sources
Design and Test of the In-Array Build-In Self-Test Scheme for the Embedded RRAM Array
An in-array build-in self-test (BIST) scheme is proposed for the embedded resistive random access memory (RRAM) array. The BIST circuit consists of the linear-feedback-shift-register (LFSR)- based pattern generator and the multi-input signature register (
Xiaole Cui +4 more
doaj +1 more source
Generator polynomial estimation of LFSR sequence based on GFFT
The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence
Lihua SHEN
doaj +2 more sources
In digital circuits, the shift registers are the significant elements having the ability of storing and transmitting the data in sequential manner.The linear feedback shift register (LFSR) uses large number of flips-flops that consumes maximum amount of ...
K. Abdul Munaf, T. Ramashri
doaj +1 more source
Privacy amplification is an indispensable procedure to share secure secret key between legitimate parties in quantum key distribution (QKD) because a portion of bits are still leaked to eavesdropper Eve after the secret reconciliation. Here, we propose a
Dengwen Li +4 more
doaj +1 more source

