Results 31 to 40 of about 535 (102)
On Binary de Bruijn Sequences from LFSRs with Arbitrary Characteristic Polynomials
We propose a construction of de Bruijn sequences by the cycle joining method from linear feedback shift registers (LFSRs) with arbitrary characteristic polynomial $f(x)$.
Chang, Zuling +3 more
core +1 more source
Genetic algorithm as self-test path and circular self-test path design method [PDF]
The paper presents the use of Genetic Algorithm to search for non-linear Autonomous Test Structures (ATS) in Built-In Testing approach. Such structures can include essentially STP and CSTP and their modifications.
Chodacki, Miłosław
core +1 more source
A cookie contains a session ID that is a unique number generated by the server. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent (GE) on the application specific integrated circuit (ASIC) for its execution.
Kavita Bhatia +3 more
wiley +1 more source
Pseudorandom number generators with self-monitoring of correct operation
A promising direction in solving information security problems is the use of stochastic methods based on the use of pseudorandom number generators (PRNG), the result of which is to insure unpredictability into the operation of computer systems and their ...
Mikhail A. Ivanov +3 more
doaj +1 more source
An improved (n,k)-NLFSR generating any a given binary sequence [PDF]
Recently, a novel (n,k)-NLFSR was proposed by E. Dubrova etc.. In this paper, we develop a novel type of (n,k)-NLFSR, called D-FSR, which can generate all the binary sequences with period p ...
Guang Yang, Xueli Wu, Jizhi Wang
openaire +1 more source
NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit +3 more
wiley +1 more source
Propuesta de optimización del algoritmo del cifrador en flujo Trivium para aplicaciones en tiempo real sobre la Plataforma Netfpga 1G [PDF]
Las organizaciones deben compartir información de carácter confidencial entre sus dependencias o con otras organizaciones, sin embargo con el aumento de los incidentes de seguridad de la información, es necesario presentar una propuesta de fácil acceso ...
Cuervo Benítez, Bernardo +1 more
core
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
This article proposed an image encryption scheme along a novel five‐dimensional hyperchaotic system and a Fibonacci Q‐matrix (FQ‐matrix) for gray images. This designed algorithm follows two key stages: the confusion stage and the diffusion stage. In the confusion step and diffusion step, the placement of the plain image pixels is replaced by a 5D ...
Geeta Biban +4 more
wiley +1 more source
A New Type of NLFSR Functions with Maximum Periods
Nonlinear feedback shift registers (NLFSRs) have received much attention in designing various cryptographic algorithms such as stream ciphers and light weight block ciphers in the provision of high-level security in communication systems. The main purpose of NLFSRs is to generate pseudorandom sequences of bits.
Ibraheem Mohammed Al-Hejri . +1 more
openaire +2 more sources
Demonstration Kit for Keeloq Technology [PDF]
Bakalářská se zabývá návrhem a vytvořením simulačního prostředí pro zabezpečovací technologii KeeLoq po hardwarové i softwarové stránce. V teto práci jsou zmíněny součastné metody zabezpečení dálkových ovladačů a popsána metoda plovoucího kódu, konkrétně
Fujdiak, Radek
core

