Results 81 to 90 of about 4,335 (184)
A method is proposed to transfer the chaotic signals obtained from a memristive Chua circuit into a suitable encryption signal for data encryption in power and data synchronous transmission using switched mode power supplies. Using statistics theory, an algorithm is proposed for selecting the optimized chaotic memristive Chua circuit signal for the ...
Chiemeka L. Maxwell +5 more
wiley +1 more source
Linear Feedback Shift Registers and Cyclic Codes in SAGE [PDF]
This talk will discuss the history of linear feedback shift registers (LFSR) in cryptographic applications and will attempt to implement an algorithm in SAGE and Python to create a linear feedback shift register sequence (LFSR sequence) in cryptography ...
Brock, Timothy
core +1 more source
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley +1 more source
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value.
Wassim Alexan +5 more
wiley +1 more source
Game Blok Bakar Berbasis Android Menggunakan Metode LCG dan LFSR
Blok Bakar merupakan permainan kartu tradisional Bali yang menggunakan kartu domino. Konsep utama dari game adalah memilih blok kartu yang terdiri dari 2 buah kartu yang sudah diacak.
Kadek Adi Praptha +2 more
doaj
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj +1 more source
Attacking the combination generator [PDF]
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to
Didier, Frédéric, Laigle-Chapuy, Yann
core +3 more sources
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many ...
Arnault, François +3 more
core +1 more source
Application of Leap-forward LFSR Based on FPGA in Pseudo Random Sequence Algorithm
There is a contradiction between computation speed and sequence length in traditional linear feedback register as its output sequence is periodic and only one bit of random sequence can be output in each clock cycle.
HAO Hongwei
doaj
A new SNOW stream cipher called SNOW-V
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment, something that can be expected to be relevant in a ...
Patrik Ekdahl +3 more
doaj +1 more source

