Results 71 to 80 of about 4,335 (184)
Constructing and Solving the System of Linear Equations Produced From LFSR Generators
Linear Feedback Shift Register (LFSR) systems are used widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed
F.H. Ali, A. A. Hussein
doaj
Partial Sums Generation Architecture for Successive Cancellation Decoding of Polar Codes
Polar codes are a new family of error correction codes for which efficient hardware architectures have to be defined for the encoder and the decoder. Polar codes are decoded using the successive cancellation decoding algorithm that includes partial sums ...
Berhault, Guillaume +3 more
core +2 more sources
Best Known Fast Correlation Attack on SNOW 3G Based on a New Insight
The well‐known SNOW 3G stream cipher serves as the core of 3GPP confidentiality and integrity algorithms UEA 2 and UIA2 for universal mobile telecommunications system (UMTS) and long term evolution (LTE) networks. Recently, Gong and Zhang gave two linear approximations of SNOW 3G with correlation 2−20.48, and then proposed a fast correlation attack on ...
Xinhai Wang +5 more
wiley +1 more source
LRH‐1/NR5A2 activation in inflammatory cells of individuals with type 1 diabetes (T1D) reduces pro‐inflammatory cell surface markers and cytokine release. LRH‐1/NR5A2 promotes a mitohormesis‐induced immuno‐resistant phenotype to pro‐inflammatory macrophages.
Nadia Cobo‐Vuilleumier +32 more
wiley +1 more source
Optimized Method for Generating and Acquiring GPS Gold Codes
We propose a simpler and faster Gold codes generator, which can be efficiently initialized to any desired code, with a minimum delay. Its principle consists of generating only one sequence (code number 1) from which we can produce all the other different
Khaled Rouabah +4 more
doaj +1 more source
Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj
Note on Marsaglia's Xorshift Random Number Generators [PDF]
Marsaglia (2003) has described a class of Xorshift random number generators (RNGs) with periods 2^n - 1 for n = 32, 64, etc. We show that the sequences generated by these RNGs are identical to the sequences generated by certain linear feedback shift ...
Richard P. Brent
core +1 more source
Global Linear Complexity Analysis of Filter Keystream Generators
An efficient algorithm for computing lower bounds on the global linear complexity of nonlinearly filtered PN-sequences is presented. The technique here developed is based exclusively on the realization of bit wise logic operations, which makes it ...
A. Fuster-Sabater +5 more
core +1 more source

