Results 81 to 90 of about 556 (107)
Some of the next articles are maybe not open access.
Lightweight encryption scheme based on a new NLFSR
Multimedia Tools and ApplicationsPunam Kumari, Bhaskar Mondal
exaly +2 more sources
Design of a novel reversible nlfsr
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017Reversibility is among the rapidly evolving areas of system design, where the design has ideally zero power dissipation. Considerable research and designs have been developed in this field and the recent designs of MACs (Multiplier and Accumulators) and memory elements in reversible logic are still a budding field of research.
Navaneetha Krishna +4 more
exaly +2 more sources
Test Pattern Generation using NLFSR for Detecting Single Stuck-at Faults
2019 International Conference on Communication and Signal Processing (ICCSP), 2019The generation of test patterns for the detection of faults in VLSI circuits is the most integral part of fault detection. The patterns are generated using Pseudorandom Number Generator (PRNG) and applied to the circuits. The most commonly used PRNG is Linear Feedback Shift Register (LFSR).
Prabhu E
exaly +2 more sources
RFID light weight server-less search protocol based on NLFSRs
2016 8th International Symposium on Telecommunications (IST), 2016Spectacular expansion of RFID systems and applications by several industries such as business, electronics, health, marketing, transportation, etc. has made RFID ever more popular. Within this context, the industry search for lower tag weight and low cost system together with solemn security to satisfy the consumer.
Abolfazl Falahati +2 more
openaire +1 more source
Generation of full cycles by a composition of NLFSRs
Designs, Codes and Cryptography, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
Design of New QCA LFSR and NLFSR for Grain-128 Stream Cipher
Journal of Circuits, Systems and Computers, 2015The use of quantum-dot cellular automata (QCA) technology for the design of logic circuits has shown to increase data transfer rates up to 2 THz. In QCA technology, circuits are designed to have an ultra-small feature size as well as ultra-low power consumption. Grain-128 is one of the best stream ciphers in the final list of the eSTREAM project.
Reza Sabbaghi-Nadooshan +2 more
openaire +1 more source
A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher
2018 International Conference on Advanced Science and Engineering (ICOASE), 2018In this paper, We propose DNA sticker model based algorithm, a computability model, which is a simulation of the parallel computations using the Molecular computing as in Adelman’s DNA computing experiment, it demonstrates how to use a sticker-based model to design a simple DNA-based algorithm for attacking a linear and a non-linear feedback shift ...
Sattar B. Sadkhan, Basim S. Yaseen
openaire +1 more source
Study of NLFSR and Reasonable Security Improvement on Trivium Cipher
2015The decision regarding widely acceptable stream cipher for hardware security is one of the challenging assignment. Trivium cipher is ironed out most of the weakness of the other stream ciphers. Beside this, our paper presents the security analysis of Trivium and some modification of cipher which gives better security level. Our primary focus is finding
Subhrajyoti Deb +2 more
openaire +1 more source
An improved (n,k)-NLFSR generating any a given binary sequence [PDF]
Recently, a novel (n,k)-NLFSR was proposed by E. Dubrova etc.. In this paper, we develop a novel type of (n,k)-NLFSR, called D-FSR, which can generate all the binary sequences with period p ...
Guang Yang, Xueli Wu, Jizhi Wang
exaly +2 more sources
The Transformation from the Galois NLFSR to the Fibonacci Configuration
2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013Two configurations of nonlinear feedback shift registers (NLFSRs) are considered. Conventional NLFSRs use the Fibonacci configuration in which the feedback is applied to the last bit only. The Galois configuration, in which the feedback can be applied to every bit, is attractive for stream ciphers to which high throughput is very important.
exaly +2 more sources

