Results 51 to 60 of about 4,335 (184)
Encryption & Hiding Information in Internet Files HTML & XML [PDF]
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj +1 more source
A m-ary linear feedback shift register with binary logic [PDF]
A family of m-ary linear feedback shift registers with binary logic is disclosed. Each m-ary linear feedback shift register with binary logic generates a binary representation of a nonbinary recurring sequence, producible with a m-ary linear feedback ...
Perlman, M.
core +1 more source
Enumeration of Linear Transformation Shift Registers
We consider the problem of counting the number of linear transformation shift registers (TSRs) of a given order over a finite field. We derive explicit formulae for the number of irreducible TSRs of order two.
Ram, Samrith
core +1 more source
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal +2 more
wiley +1 more source
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems.
Baghdad Science Journal
doaj +1 more source
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum
Bin Zhang +3 more
doaj +1 more source
In this paper, a new method for multistage digital sigma–delta modulators (DDSMs) is presented to increase the output sequence period and reduce fractional spurs. The output of a DDSM is always a periodic signal when the input is constant. A hybrid DDSM is premiere to its conventional counterpart for having a potential speed, by the choice of its ...
Seyed Ali Sadatnoori +2 more
wiley +1 more source
Algebraic Attack on the Alternating Step(r,s)Generator [PDF]
The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others.
Hassanzadeh, Mehdi M., Helleseth, Tor
core
The Cycle Structure of LFSR with Arbitrary Characteristic Polynomial over Finite Fields
We determine the cycle structure of linear feedback shift register with arbitrary monic characteristic polynomial over any finite field. For each cycle, a method to find a state and a new way to represent the state are proposed.Comment: An extended ...
Chang, Zuling +3 more
core +1 more source
Hardware Implementation of Bayesian Decision‐Making with Memristors
Lightweight Bayesian operators, implemented by integrating memristors with Boolean logics, exploit the switching stochasticity of the memristors to perform probabilistic data encoding and logic operations that are essential for Bayesian inference and fusion.
Lekai Song +10 more
wiley +1 more source

