Results 41 to 50 of about 4,335 (184)
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim +1 more
core +1 more source
Speech Encryption And Decryption Using Linear Feedback Shift Register (Lfsr)
{"references": ["Dao Q. Van, Anne Weiz and Benot Geller, Improving End to End\nLatency for Voice over IPSec Streams.", "D. Minoli and E. Minoli, Delivering Voice over IP Networks, New\nYork: John Wiley & Sons, 1998.", "D. Richard Kuhn, Thomas J. Walsh, Steffen Fries,\nSecurity Considerations for voice Over IP Systems.", "P. Alfke, \"Efficient Shift
Win, Tin Lai, Nant Christina Kyaw
openaire +1 more source
Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher
Dalam dunia teknologi informasi yang menggunakan komputer sebagai medianya, maka keamanan data (pesan) menjadi aspek yang sangat penting dalam sistem teknologi informasi.
Oskah Dakhi +4 more
doaj +1 more source
Telemedicine gains prominence in today’s scenario and image security plays a vital role in the healthcare sector for authenticating data transfer.
Siju John, S.N. Kumar
doaj +1 more source
Generator polynomial estimation of LFSR sequence based on GFFT
The problem addressed here is generator polynomial estimation of linear feedback shift register (LFSR) sequence.An algorithm based on the Galois field Fourier transform (GFFT) was proposed.The relationship between non-zero points in GFFT of LFSR sequence
Lihua SHEN
doaj +2 more sources
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
New Difference Triangle Sets by a Field‐Programmable Gate Array‐Based Search Technique
ABSTRACT We provide some difference triangle sets with scopes that improve upon the best known values. These are found with purpose‐built digital circuits realized with field‐programmable gate arrays (FPGAs) rather than software algorithms running on general‐purpose processors.
Mohannad Shehadeh +2 more
wiley +1 more source
This paper presents a power-aware Reconfigurable Parameterizable Pseudorandom Pattern Generator (RP-PRPG) for a number of applications, including built in self-testing (BIST) and cryptography.
Geethu Remadevi Somanathan +2 more
doaj +1 more source
Pseudo Random Coins Show More Heads Than Tails
Tossing a coin is the most elementary Monte Carlo experiment. In a computer the coin is replaced by a pseudo random number generator. It can be shown analytically and by exact enumerations that popular random number generators are not capable of ...
Bauke, Heiko, Mertens, Stephan
core +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source

