Results 91 to 100 of about 556 (107)
Some of the next articles are maybe not open access.
2011 IEEE International Conference on Automation and Logistics (ICAL), 2011
In this essay, the author carried on a research of the application of Port-Hopping Techniques in the defense against DoS/DDoS attacks and improved the Port-Hopping scheme with a new scheme based on ciphers, thus he provided a solution to improve the tolerance capacity of system without increasing the calculating and loading abilities.
Xu Guo, Xu Na
openaire +1 more source
In this essay, the author carried on a research of the application of Port-Hopping Techniques in the defense against DoS/DDoS attacks and improved the Port-Hopping scheme with a new scheme based on ciphers, thus he provided a solution to improve the tolerance capacity of system without increasing the calculating and loading abilities.
Xu Guo, Xu Na
openaire +1 more source
The analysis of the applicability of the decimation and the group addition property to M-NLFSR
2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018The possibility of using decimation to the sequence generated by NLFSR is considered in this paper. The possibility of searching of sequence with maximal period by dint of the decimation is considered. The possibility of calculating the correlation for NLFSR based on the principle of group addition is considered.
Nikolay Poluyanenko, Oleksandr Potii
exaly +2 more sources
Method of Synthesis M-NLFSR. Hardware and Software Search M-NLFSR Second Order. List M-NLFSR
2021Alexandr Alexandrovich Kuznetsov +4 more
openaire +1 more source
A lightweight dual-link accelerated authentication protocol based on NLFSR-XOR APUF
Microelectronics JournalHanqing Luo
exaly +2 more sources
An Algorithm for Constructing a Fastest Galois NLFSR Generating a Given Sequence
2010The problem of efficient implementation of security mechanisms for advanced contactless technologies like RFID is gaining increasing attention. Severe constraints on resources such as area, power consumption, and production cost make the application of traditional cryptographic techniques to these technologies a challenging task.
Jean-Michel Chabloz +2 more
openaire +1 more source
Research of Second-Order Properties of NLFSR. Comparative Analysis of M-NLFSR and M-LFSR
2021Alexandr Alexandrovich Kuznetsov +4 more
openaire +1 more source
Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers
Cryptography and Communications, 2021Ge Yao, Udaya Parampalli
exaly
Requirements for Feedback Coefficients, What Should the M-Nlfsr Respond to?
2021Alexandr Alexandrovich Kuznetsov +4 more
openaire +1 more source
Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2021Zhaohui Xing, Wenying Zhang, Han Guoyong
exaly

