Results 41 to 50 of about 535 (102)

Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR

open access: yes, 2022
We propose a secure and lightweight key based challenge obfuscation for strong PUFs. Our architecture is designed to be resilient against learning attacks. Our obfuscation mechanism uses non-linear feedback shift registers (NLFSRs).
Patel, Hiren   +3 more
core  

TinyJAMBU Hardware Implementation for Low Power

open access: yesIEEE Access
In this paper, we present hardware implementations of the lightweight TinyJAMBU cipher with reduced power consumption using a mechanism based on shift register parallelization.
Carlos Fernandez-Garcia   +2 more
doaj   +1 more source

FPGA-based Acceleration for Bayesian Convolutional Neural Networks [PDF]

open access: yes, 2022
Neural networks (NNs) have demonstrated their potential in a variety of domains ranging from computer vision to natural language processing. Among various NNs, two-dimensional (2D) and three-dimensional (3D) convolutional neural networks (CNNs) have been
Fan, Hongxiang   +6 more
core  

Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation

open access: yesCryptography
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault coverage by inserting scan flip-flops. However, these scan chains are also known to be a liability for security primitives.
Jiaming Wu   +4 more
doaj   +1 more source

A SECURE LOCKBOX TECHNIQUE FORENHANCED SHARED SHARING FOR USERS INFORMATION PACKETS ACCESS CONTROL IN CLOUD COMPUTING [PDF]

open access: yes, 2021
Cloud computing[12]and its security with user’smulti-label data is provided security by different module by different author. The security in terms which provided either encryption or in terms of hashing which aims to provide integrity verification.
DR.VINEET RICCHARIYA   +2 more
core   +1 more source

Automated Design Space Exploration and Datapath Synthesis for Finite Field Arithmetic with Applications to Lightweight Cryptography [PDF]

open access: yes, 2020
Today, emerging technologies are reaching astronomical proportions. For example, the Internet of Things has numerous applications and consists of countless different devices using different technologies with different capabilities.
Zidaric, Nusa
core  

Design of Modified Exclusive-128 Bit NLFSR Stream Cipher and Randomness Test

open access: yesInternational Journal of Computer Applications, 2014
In this paper, we describe modified Exclusive-128 NLFSR stream cipher which generates 128 bit keystreams using only NLFSR element as its main function and XOR operation. It consists of different sizes of NLFSRs both in Fibonacci and Galois configurations which offer better trade off between the algorithm security and hardware capability. Further, using
K. J. Jegadish Kumar   +2 more
openaire   +1 more source

Finding Matching Initial States for Equivalent NLFSRs in the Fibonacci and the Galois Configurations [PDF]

open access: yesIEEE Transactions on Information Theory, 2010
In this paper, a mapping between initial states of the Fibonacci and the Galois configurations of NLFSRs is established. We show how to choose initial states for two configurations so that the resulting output sequences are equivalent.
openaire   +2 more sources

Cifrado en flujo basado en NLFSR

open access: yes, 1998
Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado numerosos aspectos para evaluar la robustez de estos dispositivos, entre los cuales destacan la complejidad lineal de la secuencia ...
Gonzalo, R, Soriano Ibáñez, Miguel
openaire   +1 more source

Home - About - Disclaimer - Privacy