Results 31 to 40 of about 535 (102)

On Binary de Bruijn Sequences from LFSRs with Arbitrary Characteristic Polynomials

open access: yes, 2018
We propose a construction of de Bruijn sequences by the cycle joining method from linear feedback shift registers (LFSRs) with arbitrary characteristic polynomial $f(x)$.
Chang, Zuling   +3 more
core   +1 more source

Genetic algorithm as self-test path and circular self-test path design method [PDF]

open access: yes, 2018
The paper presents the use of Genetic Algorithm to search for non-linear Autonomous Test Structures (ATS) in Built-In Testing approach. Such structures can include essentially STP and CSTP and their modifications.
Chodacki, Miłosław
core   +1 more source

Securing Ports of Web Applications Against Cross Site Port Attack (XSPA) by Using a Strong Session Identifier (Session ID)

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
A cookie contains a session ID that is a unique number generated by the server. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent (GE) on the application specific integrated circuit (ASIC) for its execution.
Kavita Bhatia   +3 more
wiley   +1 more source

Pseudorandom number generators with self-monitoring of correct operation

open access: yesБезопасность информационных технологий
A promising direction in solving information security problems is the use of stochastic methods based on the use of pseudorandom number generators (PRNG), the result of which is to insure unpredictability into the operation of computer systems and their ...
Mikhail A. Ivanov   +3 more
doaj   +1 more source

An improved (n,k)-NLFSR generating any a given binary sequence [PDF]

open access: yesProceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013), 2013
Recently, a novel (n,k)-NLFSR was proposed by E. Dubrova etc.. In this paper, we develop a novel type of (n,k)-NLFSR, called D-FSR, which can generate all the binary sequences with period p ...
Guang Yang, Xueli Wu, Jizhi Wang
openaire   +1 more source

NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit   +3 more
wiley   +1 more source

Propuesta de optimización del algoritmo del cifrador en flujo Trivium para aplicaciones en tiempo real sobre la Plataforma Netfpga 1G [PDF]

open access: yes, 2017
Las organizaciones deben compartir información de carácter confidencial entre sus dependencias o con otras organizaciones, sin embargo con el aumento de los incidentes de seguridad de la información, es necesario presentar una propuesta de fácil acceso ...
Cuervo Benítez, Bernardo   +1 more
core  

5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix

open access: yesComplexity, Volume 2024, Issue 1, 2024.
This article proposed an image encryption scheme along a novel five‐dimensional hyperchaotic system and a Fibonacci Q‐matrix (FQ‐matrix) for gray images. This designed algorithm follows two key stages: the confusion stage and the diffusion stage. In the confusion step and diffusion step, the placement of the plain image pixels is replaced by a 5D ...
Geeta Biban   +4 more
wiley   +1 more source

A New Type of NLFSR Functions with Maximum Periods

open access: yesTransactions on Networks and Communications, 2018
Nonlinear feedback shift registers (NLFSRs) have received much attention in designing various cryptographic algorithms such as stream ciphers and light weight block ciphers in the provision of high-level security in communication systems. The main purpose of NLFSRs is to generate pseudorandom sequences of bits.
Ibraheem Mohammed Al-Hejri .   +1 more
openaire   +2 more sources

Demonstration Kit for Keeloq Technology [PDF]

open access: yes, 2011
Bakalářská se zabývá návrhem a vytvořením simulačního prostředí pro zabezpečovací technologii KeeLoq po hardwarové i softwarové stránce. V teto práci jsou zmíněny součastné metody zabezpečení dálkových ovladačů a popsána metoda plovoucího kódu, konkrétně
Fujdiak, Radek
core  

Home - About - Disclaimer - Privacy