Results 51 to 60 of about 4,335 (184)

Encryption & Hiding Information in Internet Files HTML & XML [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj   +1 more source

A m-ary linear feedback shift register with binary logic [PDF]

open access: yes, 1973
A family of m-ary linear feedback shift registers with binary logic is disclosed. Each m-ary linear feedback shift register with binary logic generates a binary representation of a nonbinary recurring sequence, producible with a m-ary linear feedback ...
Perlman, M.
core   +1 more source

Enumeration of Linear Transformation Shift Registers

open access: yes, 2013
We consider the problem of counting the number of linear transformation shift registers (TSRs) of a given order over a finite field. We derive explicit formulae for the number of irreducible TSRs of order two.
Ram, Samrith
core   +1 more source

A Novel Image Steganographic Method Based on Enhanced PIWT and Modified Optimal Pixel Adjustment Process

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal   +2 more
wiley   +1 more source

Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks

open access: yesمجلة بغداد للعلوم, 2007
The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems.
Baghdad Science Journal
doaj   +1 more source

Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum
Bin Zhang   +3 more
doaj   +1 more source

Design a Third‐Order DDSM With Effective Random Dither in Fractional Frequency Synthesizers to Reduce Fractional Spurs

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
In this paper, a new method for multistage digital sigma–delta modulators (DDSMs) is presented to increase the output sequence period and reduce fractional spurs. The output of a DDSM is always a periodic signal when the input is constant. A hybrid DDSM is premiere to its conventional counterpart for having a potential speed, by the choice of its ...
Seyed Ali Sadatnoori   +2 more
wiley   +1 more source

Algebraic Attack on the Alternating Step(r,s)Generator [PDF]

open access: yes, 2010
The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others.
Hassanzadeh, Mehdi M., Helleseth, Tor
core  

The Cycle Structure of LFSR with Arbitrary Characteristic Polynomial over Finite Fields

open access: yes, 2016
We determine the cycle structure of linear feedback shift register with arbitrary monic characteristic polynomial over any finite field. For each cycle, a method to find a state and a new way to represent the state are proposed.Comment: An extended ...
Chang, Zuling   +3 more
core   +1 more source

Hardware Implementation of Bayesian Decision‐Making with Memristors

open access: yesAdvanced Electronic Materials, Volume 11, Issue 16, October 6, 2025.
Lightweight Bayesian operators, implemented by integrating memristors with Boolean logics, exploit the switching stochasticity of the memristors to perform probabilistic data encoding and logic operations that are essential for Bayesian inference and fusion.
Lekai Song   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy