Results 11 to 20 of about 33 (28)

Design and Analysis of Cryptographic Pseudorandom Number/Sequence Generators with Applications in RFID [PDF]

open access: yes, 2013
This thesis is concerned with the design and analysis of strong de Bruijn sequences and span n sequences, and nonlinear feedback shift register (NLFSR) based pseudorandom number generators for radio frequency identification (RFID) tags.
Mandal, Kalikinkar
core  

Algebraic analysis of Trivium-like ciphers [PDF]

open access: yes, 2013
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions ...
Ed Dawson   +4 more
core  

Scalable Nonlinear Sequence Generation using Composite Mersenne Product Registers [PDF]

open access: yes
We introduce a novel composition method that combines linear feedback registers into larger nonlinear structures and generalizes earlier methods such as cascade connections. We prove a Chaining Period Theorem which provides the cycle structure of these
Adil Farooq   +9 more
core   +1 more source

Some Words on Cryptanalysis of Stream Ciphers [PDF]

open access: yes, 2006
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols.
Maximov, Alexander
core  

Security Improvements for the S-MIM Asynchronous Return Link [PDF]

open access: yes, 2020
S-MIM is a hybrid terrestrial and satellite system that enables efficient and high-performance communication in the return link. For communication to be possible between a device and the satellite, a preamble has to be established.
Medina Caballero, Julio Adrian   +2 more
core  

Optimized Hardware Implementations of Lightweight Cryptography [PDF]

open access: yes, 2017
Radio frequency identification (RFID) is a key technology for the Internet of Things era. One important advantage of RFID over barcodes is that line-of-sight is not required between readers and tags.
Yang, Gangqiang
core  

An investigation of chirped fibre Bragg gratings Fabry-Perot interferometer for sensing applications [PDF]

open access: yes, 2005
Fibre interferometer configurations such as the Michelson and Fabry-Perot (FP) have been formed using uniformed and chirped Fibre Bragg Gratings (FBG) acting as partial reflectors.
Cheung, Chi Shing   +2 more
core  

Role of Cryptographic Welch-Gong (WG-5) Stream Cipher in RFID Security [PDF]

open access: yes, 2012
The purpose of this thesis is to design a secure and optimized cryptographic stream cipher for passive type Radio Frequency Identification (RFID) tags. RFID technology is a wireless automatic tracking and identification device.
Mota, Rajesh Kumar
core  

XXV Congreso Argentino de Ciencias de la Computación - CACIC 2019: libro de actas [PDF]

open access: yes, 2020
Trabajos presentados en el XXV Congreso Argentino de Ciencias de la Computación (CACIC), celebrado en la ciudad de Río Cuarto los días 14 al 18 de octubre de 2019 organizado por la Red de Universidades con Carreras en Informática (RedUNCI) y Facultad de ...
Arroyo, Marcelo, Pesado, Patricia Mabel
core  

Extreme Algebraic Attacks [PDF]

open access: yes
When designing filter functions in Linear Feedback Shift Registers (LFSR) based stream ciphers, algebraic criteria of Boolean functions such as the Algebraic Immunity (AI) become key characteristics because they guarantee the security of ciphers against ...
MEAUX, Pierrick, Wang Qingju,
core   +3 more sources

Home - About - Disclaimer - Privacy