Results 31 to 40 of about 7,549 (186)

GPS-free synchronized pseudo-random number generators for internet-of-things

open access: yesFrontiers in Computer Science, 2023
IntroductionSecuring wireless communications in internet-of-things (IoT) requires both generation and synchronization of random numbers in real-time. However, resource constraints on an IoT device limit the use of computationally intensive random number ...
Mustafizur Rahman, Shantanu Chakrabartty
doaj   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]

open access: yesJisuanji kexue, 2023
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj   +1 more source

Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm

open access: yesIraqi Journal for Computers and Informatics, 2023
In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the confidentiality of image data holds paramount importance. This
Noor Kareem Jumaa, Abbas Muhammed Allawy
doaj  

Secure Image Encryption Based on Compressed Sensing and Scrambling for Internet-of-Multimedia Things

open access: yesIEEE Access, 2022
In this paper, we propose a secure image encryption system based on compressed sensing (CS) with a scrambling mechanism. For efficient encryption, we use a sparse measurement matrix, where the nonzero elements are generated by a linear feedback shift ...
Jaephil Choi, Nam Yul Yu
doaj   +1 more source

Spatial and Angular Resolution Enhancement of Light Fields Using Convolutional Neural Networks [PDF]

open access: yes, 2018
Light field imaging extends the traditional photography by capturing both spatial and angular distribution of light, which enables new capabilities, including post-capture refocusing, post-capture aperture control, and depth estimation from a single shot.
Gul, M. Shahzeb Khan   +1 more
core   +2 more sources

Design and Test of the In-Array Build-In Self-Test Scheme for the Embedded RRAM Array

open access: yesIEEE Journal of the Electron Devices Society, 2019
An in-array build-in self-test (BIST) scheme is proposed for the embedded resistive random access memory (RRAM) array. The BIST circuit consists of the linear-feedback-shift-register (LFSR)- based pattern generator and the multi-input signature register (
Xiaole Cui   +4 more
doaj   +1 more source

Generator polynomial estimation of LFSR sequence based on GFFT

open access: yesDianxin kexue, 2018
The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence
Lihua SHEN
doaj   +2 more sources

A simultaneous area, delay and leakage current reduction method for Linear Feedback Shift Register (LFSR) using pulsed latches and DTMOS transistors

open access: yese-Prime: Advances in Electrical Engineering, Electronics and Energy
In digital circuits, the shift registers are the significant elements having the ability of storing and transmitting the data in sequential manner.The linear feedback shift register (LFSR) uses large number of flips-flops that consumes maximum amount of ...
K. Abdul Munaf, T. Ramashri
doaj   +1 more source

Memory-Saving Implementation of High-Speed Privacy Amplification Algorithm for Continuous-Variable Quantum Key Distribution

open access: yesIEEE Photonics Journal, 2018
Privacy amplification is an indispensable procedure to share secure secret key between legitimate parties in quantum key distribution (QKD) because a portion of bits are still leaked to eavesdropper Eve after the secret reconciliation. Here, we propose a
Dengwen Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy