Results 41 to 50 of about 556 (107)
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault coverage by inserting scan flip-flops. However, these scan chains are also known to be a liability for security primitives.
Jiaming Wu +4 more
doaj +1 more source
A SECURE LOCKBOX TECHNIQUE FORENHANCED SHARED SHARING FOR USERS INFORMATION PACKETS ACCESS CONTROL IN CLOUD COMPUTING [PDF]
Cloud computing[12]and its security with user’smulti-label data is provided security by different module by different author. The security in terms which provided either encryption or in terms of hashing which aims to provide integrity verification.
DR.VINEET RICCHARIYA +2 more
core +1 more source
Automated Design Space Exploration and Datapath Synthesis for Finite Field Arithmetic with Applications to Lightweight Cryptography [PDF]
Today, emerging technologies are reaching astronomical proportions. For example, the Internet of Things has numerous applications and consists of countless different devices using different technologies with different capabilities.
Zidaric, Nusa
core
Design of Modified Exclusive-128 Bit NLFSR Stream Cipher and Randomness Test
In this paper, we describe modified Exclusive-128 NLFSR stream cipher which generates 128 bit keystreams using only NLFSR element as its main function and XOR operation. It consists of different sizes of NLFSRs both in Fibonacci and Galois configurations which offer better trade off between the algorithm security and hardware capability. Further, using
K. J. Jegadish Kumar +2 more
openaire +1 more source
We present the characteristic and minimal polynomials of the linear algorithms Trivium and Trivium Toy. We show the different cycles and mini-mum lengths obtained. The existence of initial states determining short cycles is verified.
Castro Lechtaler, Antonio +5 more
core +2 more sources
Finding Matching Initial States for Equivalent NLFSRs in the Fibonacci and the Galois Configurations [PDF]
In this paper, a mapping between initial states of the Fibonacci and the Galois configurations of NLFSRs is established. We show how to choose initial states for two configurations so that the resulting output sequences are equivalent.
openaire +2 more sources
Cifrado en flujo basado en NLFSR
Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móviles y redes de alta velocidad. En la literatura se han estudiado numerosos aspectos para evaluar la robustez de estos dispositivos, entre los cuales destacan la complejidad lineal de la secuencia ...
Gonzalo, R, Soriano Ibáñez, Miguel
openaire +1 more source
Some Words on Cryptanalysis of Stream Ciphers [PDF]
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols.
Maximov, Alexander
core
Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism. [PDF]
Bhatia K, Pandey SK, Singh VK, Gupta DN.
europepmc +1 more source
Symmetric block ciphers with a block length of 32 bit [PDF]
Subject of the thesis at hand is the analysis of symmetric block ciphers with a block length of 32 bit. It is meant to give a comprising overview over the topic of 32 bit block ciphers. The topic is divided in the examination of three questions.
Rothe, Stephan
core

