Results 71 to 80 of about 535 (102)
Some of the next articles are maybe not open access.

Stateless leakage resiliency from NLFSRs

2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2017
Stateless cryptographic functions are required whenever the two communicating parties are not synchronized (have no memory of previous connection). It is widely accepted that these functions can only be efficiently secured against Side-Channel Analysis (SCA) using the regular countermeasures (masking and hiding).
Mostafa Taha   +2 more
openaire   +1 more source

Constructing New NLFSR Functions with Optimal Periods

International Journal of Interdisciplinary Telecommunications and Networking, 2020
Pseudorandom bit generators are essential components in many security applications. The security of the system relies on the security of its components. Feedback shift registers are commonly used to generate pseudorandom bits. Nonlinear feedback shift registers (NLFSRs) are known to be more secure than the linear ones. However, there is no mathematical
Ibraheem Al-Hejri, Sultan Almuhammadi
openaire   +1 more source

An NLFSR-Based Stream Cipher

2006 IEEE International Symposium on Circuits and Systems, 2006
We propose a hardware oriented 80-bit-key binary additive stream cipher. The keystream generator consists of ten nonlinear feedback shift registers whose output sequences are combined by a Boolean function of algebraic degree four. The design size of the keystream generator is about 2200 GE.
B.M. Gammel, R. Gottfert, O. Kniffler
openaire   +1 more source

Design of a novel reversible nlfsr

2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
Reversibility is among the rapidly evolving areas of system design, where the design has ideally zero power dissipation. Considerable research and designs have been developed in this field and the recent designs of MACs (Multiplier and Accumulators) and memory elements in reversible logic are still a budding field of research.
Navaneetha Krishna   +4 more
openaire   +1 more source

The transformation between the Galois NLFSRs and the Fibonacci NLFSRs via semi-tensor product of matrices

Automatica, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lu, Jianquan   +4 more
openaire   +1 more source

Algebraic Cryptanalysis of A NLFSR Based Stream Cipher

2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Among recent developments on stream ciphers, the algebraic attack has gained much attention. In this paper we concentrate on algebraic cryptanalysis of Grain, a non-linear feedback shift register (NLFSR) based stream cipher. The target here is to analyze generic key generating structure of Grain, that is why, we aim to recover the internal states of ...
Mehreen Afzal, Ashraf Masood
openaire   +1 more source

Stream ciphers based on NLFSR

ITS'98 Proceedings. SBT/IEEE International Telecommunications Symposium (Cat. No.98EX202), 2002
Stream ciphering devices seem to be one of the best alternatives in order to provide confidentiality to high-speed transmissions. Several indices on the security of stream ciphers have been proposed for guaranteeing their strength. According to the literature, the linear complexity of the key stream, randomness and correlation-immune attacks are of ...
openaire   +1 more source

NLFSR Functions with Optimal Periods

2018
Nonlinear feedback shift registers (NLFSRs) are basic components, typically found in stream ciphers and other cryptosystems. The main purpose of these components is to generate pseudorandom sequences of bits. There is no mathematical foundation on how to construct an NLFSR feedback function with optimal period.
Sultan Almuhammadi   +3 more
openaire   +1 more source

A Transformation From the Fibonacci to the Galois NLFSRs

IEEE Transactions on Information Theory, 2009
Conventional nonlinear feedback shift registers (NLFSRs) use the Fibonacci configuration in which the feedback is applied to the last bit only. In this paper, we show how to transform a Fibonacci NLFSR into an equivalent NLFSR in the Galois configuration, in which the feedback can be applied to every bit.
openaire   +1 more source

RFID light weight server-less search protocol based on NLFSRs

2016 8th International Symposium on Telecommunications (IST), 2016
Spectacular expansion of RFID systems and applications by several industries such as business, electronics, health, marketing, transportation, etc. has made RFID ever more popular. Within this context, the industry search for lower tag weight and low cost system together with solemn security to satisfy the consumer.
Abolfazl Falahati   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy