Results 41 to 50 of about 7,335 (161)

Non-linear M -sequences Generation Method

open access: yesБезопасность информационных технологий, 2011
The article deals with a new method for modeling a pseudorandom number generator based on R-blocks. The gist of the method is the replacement of a multi digit XOR element by a stochastic adder in a parallel binary linear feedback shift register scheme.
Z. R. Garifullina   +3 more
doaj  

A Lightweight LFSR-Based Strong Physical Unclonable Function Design on FPGA

open access: yesIEEE Access, 2019
Physical unclonable function (PUF), a reliable physical security primitive, can be implemented in FPGAs and ASICs. Strong PUF is an important PUF classification that provides a large “Challenge-Response” pairs (CRP) space for device ...
Shen Hou, Yang Guo, Shaoqing Li
doaj   +1 more source

Rancang Bangun Game Mobile Bola Adil Berbasis Android Dengan Metode Linear Feedback Shift Register (LFSR)

open access: yesJurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi), 2018
Permainan Bola Adil merupakan permainan yang dipimpin oleh seorang blandang/bandar serta papan gambar dan bola sebagai media permainannya. Permainan Bola Adil umumnya diadakan saat ada upacara tertentu dan menjadi bagian dari Budaya Bali.
I Made Gede Suryadinatha   +2 more
doaj  

Observations on TETRA Encryption Algorithm TEA-3

open access: yesIACR Transactions on Symmetric Cryptology
We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not ...
Jens Alich   +8 more
doaj   +1 more source

Review of algebraic attacks on stream ciphers

open access: yesTongxin xuebao, 2006
The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations ...
ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
doaj   +2 more sources

Design of a Power-Aware Reconfigurable and Parameterizable Pseudorandom Pattern Generator for BIST-Based Applications

open access: yesJournal of Low Power Electronics and Applications
This paper presents a power-aware Reconfigurable Parameterizable Pseudorandom Pattern Generator (RP-PRPG) for a number of applications, including built in self-testing (BIST) and cryptography.
Geethu Remadevi Somanathan   +2 more
doaj   +1 more source

Generator polynomial estimation of LFSR sequence based on GFFT

open access: yesDianxin kexue, 2018
The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence
Lihua SHEN
doaj   +2 more sources

Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2015
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj  

PRIMITIVE MATRICES AND GENERATORS OF PSEUDO RANDOM SEQUENCES OF GALOIS

open access: yesÌнформаційні технології в освіті, 2014
In theory and practice of information cryptographic protection one of the key problems is the forming a binary pseudo-random sequences (PRS) with a maximum length with acceptable statistical characteristics.
A. Beletsky, E. Beletsky
doaj  

Home - About - Disclaimer - Privacy