Results 31 to 40 of about 337 (159)
Generator polynomial estimation of LFSR sequence based on GFFT
The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence
Lihua SHEN
doaj +2 more sources
New Difference Triangle Sets by a Field‐Programmable Gate Array‐Based Search Technique
ABSTRACT We provide some difference triangle sets with scopes that improve upon the best known values. These are found with purpose‐built digital circuits realized with field‐programmable gate arrays (FPGAs) rather than software algorithms running on general‐purpose processors.
Mohannad Shehadeh +2 more
wiley +1 more source
Encryption & Hiding Information in Internet Files HTML & XML [PDF]
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
This paper presents a power-aware Reconfigurable Parameterizable Pseudorandom Pattern Generator (RP-PRPG) for a number of applications, including built in self-testing (BIST) and cryptography.
Geethu Remadevi Somanathan +2 more
doaj +1 more source
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems.
Baghdad Science Journal
doaj +1 more source
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum
Bin Zhang +3 more
doaj +1 more source
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal +2 more
wiley +1 more source
In this paper, a new method for multistage digital sigma–delta modulators (DDSMs) is presented to increase the output sequence period and reduce fractional spurs. The output of a DDSM is always a periodic signal when the input is constant. A hybrid DDSM is premiere to its conventional counterpart for having a potential speed, by the choice of its ...
Seyed Ali Sadatnoori +2 more
wiley +1 more source
Hardware Implementation of Bayesian Decision‐Making with Memristors
Lightweight Bayesian operators, implemented by integrating memristors with Boolean logics, exploit the switching stochasticity of the memristors to perform probabilistic data encoding and logic operations that are essential for Bayesian inference and fusion.
Lekai Song +10 more
wiley +1 more source

