Results 41 to 50 of about 337 (159)
A new (k,n) verifiable secret image sharing scheme (VSISS)
In this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in which third order LFSR (linear-feedback shift register)-based public key cryptosystem is applied for the cheating prevention and preview before decryption.
Amitava Nag +3 more
doaj +1 more source
In this article, an energy‐efficient hardware implementation of spiking‐restricted Boltzmann machines using the pseudo‐synaptic sampling (PS2) method is presented. In the PS2 method, superior area and energy efficiency over previous approaches, such as the random walk method, are demonstrated, achieving a 94.94% reduction in power consumption during on‐
Hyunwoo Kim +10 more
wiley +1 more source
New Families of Strength‐3 Covering Arrays Using Linear Feedback Shift Register Sequences
ABSTRACT In an array over an alphabet of v symbols, a t‐set of column indices { c 1 , … , c t } is covered if each t‐tuple of the alphabet occurs at least once as a row of the sub‐array indexed by c 1 , … , c t. A covering array, denoted by CA( N ; t , k , v ), is an N × k array over an alphabet with v symbols with the property that any t‐set of ...
Kianoosh Shokri, Lucia Moura
wiley +1 more source
A P-N Sequence Generator Using LFSR with Dual Edge Trigger Technique
This paper represents the design and implementation of a low power 4-bit LFSR using Dual edge triggered flip flop. A linear feedback shift register (LFSR) is assembled by N number of flip flops connected in series and a combinational logic generally xor ...
Naghwal Nitin Kumar, Kumar Abhishek
doaj +1 more source
GPS-free synchronized pseudo-random number generators for internet-of-things
IntroductionSecuring wireless communications in internet-of-things (IoT) requires both generation and synchronization of random numbers in real-time. However, resource constraints on an IoT device limit the use of computationally intensive random number ...
Mustafizur Rahman, Shantanu Chakrabartty
doaj +1 more source
Translating weighted probabilistic bits to synthetic genetic circuits
Abstract Synthetic genetic circuits in plants could be the next technological horizon in plant breeding, showcasing potential for precise patterned control over expression. Nevertheless, uncertainty in metabolic environments prevents robust scaling of traditional genetic circuits for agricultural use, and studies show that a deterministic system is at ...
Matthew D. Ciccone, Carlos D. Messina
wiley +1 more source
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta +4 more
wiley +1 more source
A cookie contains a session ID that is a unique number generated by the server. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent (GE) on the application specific integrated circuit (ASIC) for its execution.
Kavita Bhatia +3 more
wiley +1 more source
Best Known Fast Correlation Attack on SNOW 3G Based on a New Insight
The well‐known SNOW 3G stream cipher serves as the core of 3GPP confidentiality and integrity algorithms UEA 2 and UIA2 for universal mobile telecommunications system (UMTS) and long term evolution (LTE) networks. Recently, Gong and Zhang gave two linear approximations of SNOW 3G with correlation 2−20.48, and then proposed a fast correlation attack on ...
Xinhai Wang +5 more
wiley +1 more source
Constructing and Solving the System of Linear Equations Produced From LFSR Generators
Linear Feedback Shift Register (LFSR) systems are used widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed
F.H. Ali, A. A. Hussein
doaj

