Results 1 to 10 of about 125,569 (205)
NFBC: an efficient FPGA based NFSR-oriented lightweight block cipher suitable for embedded system [PDF]
Efficiency is essential in lightweight cryptography to ensure robust protection within constrained environments. This paper introduces a lightweight block cipher built on a Non-Linear Feedback Shift Register (NFSR), referred to as the NFSR-Based Block ...
Runa Chatterjee, Rajdeep Chakraborty
doaj +2 more sources
The paper describes methods of protection against reverse engineering of logic circuits of pseudo-random number generators (PRNG) on linear and non-linear feedback shift registers.
Michael A. Ivanov +3 more
doaj +1 more source
Blind Estimation of Self-Synchronous Scrambler in DSSS Systems
Self-synchronous scramblers are more difficult to blindly estimate than synchronous scramblers because their input sequence affects the state of the scrambler’s linear feedback shift register.
Dongyeong Kim, Dongweon Yoon
doaj +1 more source
The Frequency Theoretic Estimation of non-Linear Key Generator Sequences [PDF]
The Randomness is one of the basic criterions to measure Key Generator Efficiency. The key generator depends basically on Linear FeedBack Shift Register which is considered as one of the basic units of Stream Cipher Systems.
Abdul Monem S. Rahma +2 more
doaj +1 more source
An innovative approach for dynamic key dependent S-Box to enhance security of IoT systems
The Internet of Things (IoT) foresees pervasive and connected smart nodes that interact independently while offering varied services. Today, IoT nodes are a treasure house of data and hence security has become a major concern in IoT networks ...
Divya James, TKS Lakshmi Priya
doaj +1 more source
Encryption & Hiding Information in Internet Files HTML & XML [PDF]
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj +1 more source
Weak-keys and key-recovery attack for $$\text{ TinyJAMBU }$$ TinyJAMBU
In this paper, we study NIST lightweight 3rd round candidate $$\text{ TinyJAMBU }$$ TinyJAMBU . The core component of $$\text{ TinyJAMBU }$$ TinyJAMBU is the keyed permutation $$\mathcal {P}_n$$ P n , which is based on a non-linear feedback shift ...
Pranjal Dutta +2 more
doaj +1 more source
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm
Cryptographic algorithms for confidentiality and authentication play a major important role in nowadays information security Sen (2012) [1]. Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure ...
Hadia M.S. El Hennawy +2 more
doaj +1 more source
On the inherent intractability of certain coding problems [PDF]
The fact that the general decoding problem for linear codes and the general problem of finding the weights of a linear code are both NP-complete is shown.
Berlekamp, Elwyn R. +2 more
core +1 more source
A new (k,n) verifiable secret image sharing scheme (VSISS)
In this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in which third order LFSR (linear-feedback shift register)-based public key cryptosystem is applied for the cheating prevention and preview before decryption.
Amitava Nag +3 more
doaj +1 more source

