Results 31 to 40 of about 7,335 (161)
Many researchers are trying to make our lives easier with developments in the Internet of Things, industry 4.0, and artificial intelligence. However, when the security of the data, which is at the centre of all these developments, is not ensured, the ...
Eyup Eroz +2 more
doaj +1 more source
Design and Test of the In-Array Build-In Self-Test Scheme for the Embedded RRAM Array
An in-array build-in self-test (BIST) scheme is proposed for the embedded resistive random access memory (RRAM) array. The BIST circuit consists of the linear-feedback-shift-register (LFSR)- based pattern generator and the multi-input signature register (
Xiaole Cui +4 more
doaj +1 more source
SCALABLE LOGIC BIST DESIGN AND ANALYSIS FOR ENHANCED TESTING OF COMBINATIONAL CIRCUITS [PDF]
The paper introduces a scalable Logic Built-In Self-Test (BIST) approach for combinational circuits, utilizing a Bit Swapping Linear Feedback Shift Register (BS-LFSR) as the test pattern generator.
Suhas Shirol +3 more
doaj +1 more source
Application of Leap-forward LFSR Based on FPGA in Pseudo Random Sequence Algorithm
There is a contradiction between computation speed and sequence length in traditional linear feedback register as its output sequence is periodic and only one bit of random sequence can be output in each clock cycle.
HAO Hongwei
doaj
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm
Cryptographic algorithms for confidentiality and authentication play a major important role in nowadays information security Sen (2012) [1]. Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure ...
Hadia M.S. El Hennawy +2 more
doaj +1 more source
Low Power Implementation of Linear Feedback Shift Registers
This paper describes low power design and implementation of Linear Feedback Shift Register (LFSR). The easiness in implementation and simple operation of Linear Feedback Shift Register have made it fit into a wide range of digital systems design. Since random pattern generation, data encryption and decryption play a major role in communication systems,
Jayasanthi M, Kowsalyadevi AK
openaire +1 more source
Construction of diffusion layers based on cipher structures
Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the ...
Peng-fei LI
doaj +3 more sources
The mechanism of quantum mechanics is considered as the principal method of quantum key distribution for transmitting a cryptographic key between users in unconditionally secure communication.
Omar Sh. Mustafa +2 more
doaj +1 more source
SYNTHESIS OF PRIMITIVE MATRICES OVER A FINITE GALOIS FIELDS AND THEIR APPLICATIONS
The algorithms for constructing generalized primitive matrices Galois and Fibonacci arbitrary order , the items belong to the prime field , . The examples of application of these matrices in the problems of the synthesis of generalized linear shift ...
A.J. Beletsky, А.А. Beletsky
doaj
Linkable Ring Signatures from Linear Feedback Shift Register [PDF]
Linkable ring signatures can simultaneously provide the properties of anonymity, spontaneity as well as linkability. Linear feedback shift register (LFSR) sequence can be used to shorten the representation of elements in a field. This paper proposes an LFSR-based linkable ring signature scheme, whose main computation operations are performed in base ...
Dong Zheng +3 more
openaire +1 more source

