Results 41 to 50 of about 556 (107)

Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation

open access: yesCryptography
Design-for-test/debug (DfT/D) introduces scan chain testing to increase testability and fault coverage by inserting scan flip-flops. However, these scan chains are also known to be a liability for security primitives.
Jiaming Wu   +4 more
doaj   +1 more source

A SECURE LOCKBOX TECHNIQUE FORENHANCED SHARED SHARING FOR USERS INFORMATION PACKETS ACCESS CONTROL IN CLOUD COMPUTING [PDF]

open access: yes, 2021
Cloud computing[12]and its security with user’smulti-label data is provided security by different module by different author. The security in terms which provided either encryption or in terms of hashing which aims to provide integrity verification.
DR.VINEET RICCHARIYA   +2 more
core   +1 more source

Automated Design Space Exploration and Datapath Synthesis for Finite Field Arithmetic with Applications to Lightweight Cryptography [PDF]

open access: yes, 2020
Today, emerging technologies are reaching astronomical proportions. For example, the Internet of Things has numerous applications and consists of countless different devices using different technologies with different capabilities.
Zidaric, Nusa
core  

Design of Modified Exclusive-128 Bit NLFSR Stream Cipher and Randomness Test

open access: yesInternational Journal of Computer Applications, 2014
In this paper, we describe modified Exclusive-128 NLFSR stream cipher which generates 128 bit keystreams using only NLFSR element as its main function and XOR operation. It consists of different sizes of NLFSRs both in Fibonacci and Galois configurations which offer better trade off between the algorithm security and hardware capability. Further, using
K. J. Jegadish Kumar   +2 more
openaire   +1 more source

Trivium vs. Trivium Toy [PDF]

open access: yes, 2014
We present the characteristic and minimal polynomials of the linear algorithms Trivium and Trivium Toy. We show the different cycles and mini-mum lengths obtained. The existence of initial states determining short cycles is verified.
Castro Lechtaler, Antonio   +5 more
core   +2 more sources

Finding Matching Initial States for Equivalent NLFSRs in the Fibonacci and the Galois Configurations [PDF]

open access: yesIEEE Transactions on Information Theory, 2010
In this paper, a mapping between initial states of the Fibonacci and the Galois configurations of NLFSRs is established. We show how to choose initial states for two configurations so that the resulting output sequences are equivalent.
openaire   +2 more sources

Cifrado en flujo basado en NLFSR

open access: yes, 1998
Los mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móvi­les y redes de alta velocidad. En la literatura se han estudiado numerosos aspectos para evaluar la robustez de estos dispositivos, entre los cuales destacan la complejidad lineal de la secuencia ...
Gonzalo, R, Soriano Ibáñez, Miguel
openaire   +1 more source

Some Words on Cryptanalysis of Stream Ciphers [PDF]

open access: yes, 2006
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols.
Maximov, Alexander
core  

Symmetric block ciphers with a block length of 32 bit [PDF]

open access: yes, 2018
Subject of the thesis at hand is the analysis of symmetric block ciphers with a block length of 32 bit. It is meant to give a comprising overview over the topic of 32 bit block ciphers. The topic is divided in the examination of three questions.
Rothe, Stephan
core  

Home - About - Disclaimer - Privacy