Results 11 to 20 of about 33 (28)
Design and Analysis of Cryptographic Pseudorandom Number/Sequence Generators with Applications in RFID [PDF]
This thesis is concerned with the design and analysis of strong de Bruijn sequences and span n sequences, and nonlinear feedback shift register (NLFSR) based pseudorandom number generators for radio frequency identification (RFID) tags.
Mandal, Kalikinkar
core
Algebraic analysis of Trivium-like ciphers [PDF]
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions ...
Ed Dawson +4 more
core
Scalable Nonlinear Sequence Generation using Composite Mersenne Product Registers [PDF]
We introduce a novel composition method that combines linear feedback registers into larger nonlinear structures and generalizes earlier methods such as cascade connections. We prove a Chaining Period Theorem which provides the cycle structure of these
Adil Farooq +9 more
core +1 more source
Some Words on Cryptanalysis of Stream Ciphers [PDF]
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols.
Maximov, Alexander
core
Security Improvements for the S-MIM Asynchronous Return Link [PDF]
S-MIM is a hybrid terrestrial and satellite system that enables efficient and high-performance communication in the return link. For communication to be possible between a device and the satellite, a preamble has to be established.
Medina Caballero, Julio Adrian +2 more
core
Optimized Hardware Implementations of Lightweight Cryptography [PDF]
Radio frequency identification (RFID) is a key technology for the Internet of Things era. One important advantage of RFID over barcodes is that line-of-sight is not required between readers and tags.
Yang, Gangqiang
core
An investigation of chirped fibre Bragg gratings Fabry-Perot interferometer for sensing applications [PDF]
Fibre interferometer configurations such as the Michelson and Fabry-Perot (FP) have been formed using uniformed and chirped Fibre Bragg Gratings (FBG) acting as partial reflectors.
Cheung, Chi Shing +2 more
core
Role of Cryptographic Welch-Gong (WG-5) Stream Cipher in RFID Security [PDF]
The purpose of this thesis is to design a secure and optimized cryptographic stream cipher for passive type Radio Frequency Identification (RFID) tags. RFID technology is a wireless automatic tracking and identification device.
Mota, Rajesh Kumar
core
XXV Congreso Argentino de Ciencias de la Computación - CACIC 2019: libro de actas [PDF]
Trabajos presentados en el XXV Congreso Argentino de Ciencias de la Computación (CACIC), celebrado en la ciudad de Río Cuarto los días 14 al 18 de octubre de 2019 organizado por la Red de Universidades con Carreras en Informática (RedUNCI) y Facultad de ...
Arroyo, Marcelo, Pesado, Patricia Mabel
core
Extreme Algebraic Attacks [PDF]
When designing filter functions in Linear Feedback Shift Registers (LFSR) based stream ciphers, algebraic criteria of Boolean functions such as the Algebraic Immunity (AI) become key characteristics because they guarantee the security of ciphers against ...
MEAUX, Pierrick, Wang Qingju,
core +3 more sources

