Results 71 to 80 of about 7,549 (186)

A note on the multiple-recursive matrix method for generating pseudorandom vectors

open access: yes, 2017
The multiple-recursive matrix method for generating pseudorandom vectors was introduced by Niederreiter (Linear Algebra Appl. 192 (1993), 301-328). We propose an algorithm for finding an efficient primitive multiple-recursive matrix method. Moreover, for
Bishoi, Susil Kumar   +2 more
core   +1 more source

Construction of diffusion layers based on cipher structures

open access: yes网络与信息安全学报, 2017
Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the ...
Peng-fei LI
doaj   +3 more sources

Scrambling and De-Scrambling Implementation Using Linear Feedback Shift Register Method on FPGA

open access: yesIJAIT (International Journal of Applied Information Technology), 2017
Digital broadband communications require a fast, functional and efficient system. In a digital communication system, a long sequence of bits '0' or '1' will inherits the loss of bit synchronization, and hence it can cause the false detection on the ...
Manda Lurina   +2 more
doaj   +1 more source

Optical Nanoscopy for Elucidating Nano–Bio Interactions: A One Health Perspective

open access: yesAdvanced Optical Materials, Volume 13, Issue 13, May 5, 2025.
The review comprehensively summarizes the application of far‐field fluorescence nanoscopy for the characterization of nanomaterial interactions with biological systems at the single‐particle and molecular scale, with an accent on their impact on human and ecosystem health.
Elisa De Luca   +5 more
wiley   +1 more source

Energy‐Efficient Hardware Implementation of Spiking‐Restricted Boltzmann Machines Using Pseudo‐Synaptic Sampling

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
In this article, an energy‐efficient hardware implementation of spiking‐restricted Boltzmann machines using the pseudo‐synaptic sampling (PS2) method is presented. In the PS2 method, superior area and energy efficiency over previous approaches, such as the random walk method, are demonstrated, achieving a 94.94% reduction in power consumption during on‐
Hyunwoo Kim   +10 more
wiley   +1 more source

Design of a Power-Aware Reconfigurable and Parameterizable Pseudorandom Pattern Generator for BIST-Based Applications

open access: yesJournal of Low Power Electronics and Applications
This paper presents a power-aware Reconfigurable Parameterizable Pseudorandom Pattern Generator (RP-PRPG) for a number of applications, including built in self-testing (BIST) and cryptography.
Geethu Remadevi Somanathan   +2 more
doaj   +1 more source

Revisiting LFSMs

open access: yes, 2010
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many ...
Arnault, François   +3 more
core   +1 more source

Integrated Pockels Modulators on Silicon Photonics Platform

open access: yesAdvanced Physics Research, Volume 4, Issue 4, April 2025.
Integrated Pockels modulators have emerged as crucial building blocks in many applications for transforming electric signals into optical signals quickly and efficiently. In this review, various types of modulators based on different Pockels platforms are outlined.
Jian Shen   +10 more
wiley   +1 more source

Optimized Pseudo Random Bit Generator in QCA Technology

open access: yesEngineering Reports, Volume 7, Issue 4, April 2025.
The proposed four‐bit LFSR ABSTRACT Quantum Dot Cellular Automata (QCA) technology is one of the new technologies in the field of digital electronics. In this article, for the first time, some unique designs are presented in the most optimal possible state in the QCA technology.
Pezhman Kiani Vosta   +2 more
wiley   +1 more source

Model design for a reduced variant of a Trivium Type Stream Cipher

open access: yesJournal of Computer Science and Technology, 2014
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorithm and its variants. In particular, we study the NLFSRs used in these generators, their feedback functions and their combination.
Antonio Castro Lechtaler   +5 more
doaj  

Home - About - Disclaimer - Privacy