Results 71 to 80 of about 4,335 (184)

Constructing and Solving the System of Linear Equations Produced From LFSR Generators

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
  Linear Feedback Shift Register (LFSR) systems are used  widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed
F.H. Ali, A. A. Hussein
doaj  

Partial Sums Generation Architecture for Successive Cancellation Decoding of Polar Codes

open access: yes, 2013
Polar codes are a new family of error correction codes for which efficient hardware architectures have to be defined for the encoder and the decoder. Polar codes are decoded using the successive cancellation decoding algorithm that includes partial sums ...
Berhault, Guillaume   +3 more
core   +2 more sources

Best Known Fast Correlation Attack on SNOW 3G Based on a New Insight

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The well‐known SNOW 3G stream cipher serves as the core of 3GPP confidentiality and integrity algorithms UEA 2 and UIA2 for universal mobile telecommunications system (UMTS) and long term evolution (LTE) networks. Recently, Gong and Zhang gave two linear approximations of SNOW 3G with correlation 2−20.48, and then proposed a fast correlation attack on ...
Xinhai Wang   +5 more
wiley   +1 more source

LRH‐1/NR5A2 targets mitochondrial dynamics to reprogram type 1 diabetes macrophages and dendritic cells into an immune tolerance phenotype

open access: yesClinical and Translational Medicine, Volume 14, Issue 12, December 2024.
LRH‐1/NR5A2 activation in inflammatory cells of individuals with type 1 diabetes (T1D) reduces pro‐inflammatory cell surface markers and cytokine release. LRH‐1/NR5A2 promotes a mitohormesis‐induced immuno‐resistant phenotype to pro‐inflammatory macrophages.
Nadia Cobo‐Vuilleumier   +32 more
wiley   +1 more source

Optimized Method for Generating and Acquiring GPS Gold Codes

open access: yesInternational Journal of Antennas and Propagation, 2015
We propose a simpler and faster Gold codes generator, which can be efficiently initialized to any desired code, with a minimum delay. Its principle consists of generating only one sequence (code number 1) from which we can produce all the other different
Khaled Rouabah   +4 more
doaj   +1 more source

Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]

open access: yes, 2002
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core  

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2015
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj  

Note on Marsaglia's Xorshift Random Number Generators [PDF]

open access: yes
Marsaglia (2003) has described a class of Xorshift random number generators (RNGs) with periods 2^n - 1 for n = 32, 64, etc. We show that the sequences generated by these RNGs are identical to the sequences generated by certain linear feedback shift ...
Richard P. Brent
core   +1 more source

Global Linear Complexity Analysis of Filter Keystream Generators

open access: yes, 1997
An efficient algorithm for computing lower bounds on the global linear complexity of nonlinearly filtered PN-sequences is presented. The technique here developed is based exclusively on the realization of bit wise logic operations, which makes it ...
A. Fuster-Sabater   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy