Results 31 to 40 of about 556 (107)

NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit   +3 more
wiley   +1 more source

Propuesta de optimización del algoritmo del cifrador en flujo Trivium para aplicaciones en tiempo real sobre la Plataforma Netfpga 1G [PDF]

open access: yes, 2017
Las organizaciones deben compartir información de carácter confidencial entre sus dependencias o con otras organizaciones, sin embargo con el aumento de los incidentes de seguridad de la información, es necesario presentar una propuesta de fácil acceso ...
Cuervo Benítez, Bernardo   +1 more
core  

Genetic algorithm as self-test path and circular self-test path design method [PDF]

open access: yes, 2018
The paper presents the use of Genetic Algorithm to search for non-linear Autonomous Test Structures (ATS) in Built-In Testing approach. Such structures can include essentially STP and CSTP and their modifications.
Chodacki, Miłosław
core   +1 more source

5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix

open access: yesComplexity, Volume 2024, Issue 1, 2024.
This article proposed an image encryption scheme along a novel five‐dimensional hyperchaotic system and a Fibonacci Q‐matrix (FQ‐matrix) for gray images. This designed algorithm follows two key stages: the confusion stage and the diffusion stage. In the confusion step and diffusion step, the placement of the plain image pixels is replaced by a 5D ...
Geeta Biban   +4 more
wiley   +1 more source

A New Type of NLFSR Functions with Maximum Periods

open access: yesTransactions on Networks and Communications, 2018
Nonlinear feedback shift registers (NLFSRs) have received much attention in designing various cryptographic algorithms such as stream ciphers and light weight block ciphers in the provision of high-level security in communication systems. The main purpose of NLFSRs is to generate pseudorandom sequences of bits.
Ibraheem Mohammed Al-Hejri .   +1 more
openaire   +2 more sources

Demonstration Kit for Keeloq Technology [PDF]

open access: yes, 2011
Bakalářská se zabývá návrhem a vytvořením simulačního prostředí pro zabezpečovací technologii KeeLoq po hardwarové i softwarové stránce. V teto práci jsou zmíněny součastné metody zabezpečení dálkových ovladačů a popsána metoda plovoucího kódu, konkrétně
Fujdiak, Radek
core  

Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR

open access: yes, 2022
We propose a secure and lightweight key based challenge obfuscation for strong PUFs. Our architecture is designed to be resilient against learning attacks. Our obfuscation mechanism uses non-linear feedback shift registers (NLFSRs).
Patel, Hiren   +3 more
core  

TinyJAMBU Hardware Implementation for Low Power

open access: yesIEEE Access
In this paper, we present hardware implementations of the lightweight TinyJAMBU cipher with reduced power consumption using a mechanism based on shift register parallelization.
Carlos Fernandez-Garcia   +2 more
doaj   +1 more source

FPGA-based Acceleration for Bayesian Convolutional Neural Networks [PDF]

open access: yes, 2022
Neural networks (NNs) have demonstrated their potential in a variety of domains ranging from computer vision to natural language processing. Among various NNs, two-dimensional (2D) and three-dimensional (3D) convolutional neural networks (CNNs) have been
Fan, Hongxiang   +6 more
core  

Home - About - Disclaimer - Privacy