Results 41 to 50 of about 4,335 (184)

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

Speech Encryption And Decryption Using Linear Feedback Shift Register (Lfsr)

open access: yes, 2008
{"references": ["Dao Q. Van, Anne Weiz and Benot Geller, Improving End to End\nLatency for Voice over IPSec Streams.", "D. Minoli and E. Minoli, Delivering Voice over IP Networks, New\nYork: John Wiley & Sons, 1998.", "D. Richard Kuhn, Thomas J. Walsh, Steffen Fries,\nSecurity Considerations for voice Over IP Systems.", "P. Alfke, \"Efficient Shift
Win, Tin Lai, Nant Christina Kyaw
openaire   +1 more source

Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher

open access: yesInvotek: Jurnal Inovasi Vokasional dan Teknologi, 2020
Dalam dunia teknologi informasi yang menggunakan komputer sebagai medianya, maka keamanan data (pesan) menjadi aspek yang sangat penting dalam sistem teknologi informasi.
Oskah Dakhi   +4 more
doaj   +1 more source

IoT based medical image encryption using linear feedback shift register – Towards ensuring security for teleradiology applications

open access: yesMeasurement: Sensors, 2023
Telemedicine gains prominence in today’s scenario and image security plays a vital role in the healthcare sector for authenticating data transfer.
Siju John, S.N. Kumar
doaj   +1 more source

Generator polynomial estimation of LFSR sequence based on GFFT

open access: yesDianxin kexue, 2018
The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence
Lihua SHEN
doaj   +2 more sources

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 2, February 2026.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

New Difference Triangle Sets by a Field‐Programmable Gate Array‐Based Search Technique

open access: yesJournal of Combinatorial Designs, Volume 34, Issue 1, Page 37-50, January 2026.
ABSTRACT We provide some difference triangle sets with scopes that improve upon the best known values. These are found with purpose‐built digital circuits realized with field‐programmable gate arrays (FPGAs) rather than software algorithms running on general‐purpose processors.
Mohannad Shehadeh   +2 more
wiley   +1 more source

Design of a Power-Aware Reconfigurable and Parameterizable Pseudorandom Pattern Generator for BIST-Based Applications

open access: yesJournal of Low Power Electronics and Applications
This paper presents a power-aware Reconfigurable Parameterizable Pseudorandom Pattern Generator (RP-PRPG) for a number of applications, including built in self-testing (BIST) and cryptography.
Geethu Remadevi Somanathan   +2 more
doaj   +1 more source

Pseudo Random Coins Show More Heads Than Tails

open access: yes, 2004
Tossing a coin is the most elementary Monte Carlo experiment. In a computer the coin is replaced by a pseudo random number generator. It can be shown analytically and by exact enumerations that popular random number generators are not capable of ...
Bauke, Heiko, Mertens, Stephan
core   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy