Results 31 to 40 of about 337 (159)

Generator polynomial estimation of LFSR sequence based on GFFT

open access: yesDianxin kexue, 2018
The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence
Lihua SHEN
doaj   +2 more sources

New Difference Triangle Sets by a Field‐Programmable Gate Array‐Based Search Technique

open access: yesJournal of Combinatorial Designs, Volume 34, Issue 1, Page 37-50, January 2026.
ABSTRACT We provide some difference triangle sets with scopes that improve upon the best known values. These are found with purpose‐built digital circuits realized with field‐programmable gate arrays (FPGAs) rather than software algorithms running on general‐purpose processors.
Mohannad Shehadeh   +2 more
wiley   +1 more source

Encryption & Hiding Information in Internet Files HTML & XML [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Design of a Power-Aware Reconfigurable and Parameterizable Pseudorandom Pattern Generator for BIST-Based Applications

open access: yesJournal of Low Power Electronics and Applications
This paper presents a power-aware Reconfigurable Parameterizable Pseudorandom Pattern Generator (RP-PRPG) for a number of applications, including built in self-testing (BIST) and cryptography.
Geethu Remadevi Somanathan   +2 more
doaj   +1 more source

Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks

open access: yesمجلة بغداد للعلوم, 2007
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems.
Baghdad Science Journal
doaj   +1 more source

Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum
Bin Zhang   +3 more
doaj   +1 more source

A Novel Image Steganographic Method Based on Enhanced PIWT and Modified Optimal Pixel Adjustment Process

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal   +2 more
wiley   +1 more source

Design a Third‐Order DDSM With Effective Random Dither in Fractional Frequency Synthesizers to Reduce Fractional Spurs

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
In this paper, a new method for multistage digital sigma–delta modulators (DDSMs) is presented to increase the output sequence period and reduce fractional spurs. The output of a DDSM is always a periodic signal when the input is constant. A hybrid DDSM is premiere to its conventional counterpart for having a potential speed, by the choice of its ...
Seyed Ali Sadatnoori   +2 more
wiley   +1 more source

Hardware Implementation of Bayesian Decision‐Making with Memristors

open access: yesAdvanced Electronic Materials, Volume 11, Issue 16, October 6, 2025.
Lightweight Bayesian operators, implemented by integrating memristors with Boolean logics, exploit the switching stochasticity of the memristors to perform probabilistic data encoding and logic operations that are essential for Bayesian inference and fusion.
Lekai Song   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy