Results 1 to 10 of about 125,569 (205)

NFBC: an efficient FPGA based NFSR-oriented lightweight block cipher suitable for embedded system [PDF]

open access: yesScientific Reports
Efficiency is essential in lightweight cryptography to ensure robust protection within constrained environments. This paper introduces a lightweight block cipher built on a Non-Linear Feedback Shift Register (NFSR), referred to as the NFSR-Based Block ...
Runa Chatterjee, Rajdeep Chakraborty
doaj   +2 more sources

Obfuscation of logic schemes of pseudo-random number generators based on linear and non-linear feedback shift registers

open access: yesБезопасность информационных технологий, 2021
The paper describes methods of protection against reverse engineering of logic circuits of pseudo-random number generators (PRNG) on linear and non-linear feedback shift registers.
Michael A. Ivanov   +3 more
doaj   +1 more source

Blind Estimation of Self-Synchronous Scrambler in DSSS Systems

open access: yesIEEE Access, 2021
Self-synchronous scramblers are more difficult to blindly estimate than synchronous scramblers because their input sequence affects the state of the scrambler’s linear feedback shift register.
Dongyeong Kim, Dongweon Yoon
doaj   +1 more source

The Frequency Theoretic Estimation of non-Linear Key Generator Sequences [PDF]

open access: yesEngineering and Technology Journal, 2011
The Randomness is one of the basic criterions to measure Key Generator Efficiency. The key generator depends basically on Linear FeedBack Shift Register which is considered as one of the basic units of Stream Cipher Systems.
Abdul Monem S. Rahma   +2 more
doaj   +1 more source

An innovative approach for dynamic key dependent S-Box to enhance security of IoT systems

open access: yesMeasurement: Sensors, 2023
The Internet of Things (IoT) foresees pervasive and connected smart nodes that interact independently while offering varied services. Today, IoT nodes are a treasure house of data and hence security has become a major concern in IoT networks ...
Divya James, TKS Lakshmi Priya
doaj   +1 more source

Encryption & Hiding Information in Internet Files HTML & XML [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj   +1 more source

Weak-keys and key-recovery attack for $$\text{ TinyJAMBU }$$ TinyJAMBU

open access: yesScientific Reports, 2022
In this paper, we study NIST lightweight 3rd round candidate $$\text{ TinyJAMBU }$$ TinyJAMBU . The core component of $$\text{ TinyJAMBU }$$ TinyJAMBU is the keyed permutation $$\mathcal {P}_n$$ P n , which is based on a non-linear feedback shift ...
Pranjal Dutta   +2 more
doaj   +1 more source

LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm

open access: yesAin Shams Engineering Journal, 2015
Cryptographic algorithms for confidentiality and authentication play a major important role in nowadays information security Sen (2012) [1]. Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure ...
Hadia M.S. El Hennawy   +2 more
doaj   +1 more source

On the inherent intractability of certain coding problems [PDF]

open access: yes, 1978
The fact that the general decoding problem for linear codes and the general problem of finding the weights of a linear code are both NP-complete is shown.
Berlekamp, Elwyn R.   +2 more
core   +1 more source

A new (k,n) verifiable secret image sharing scheme (VSISS)

open access: yesEgyptian Informatics Journal, 2014
In this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in which third order LFSR (linear-feedback shift register)-based public key cryptosystem is applied for the cheating prevention and preview before decryption.
Amitava Nag   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy