Results 11 to 20 of about 125,569 (205)

Security analysis of linearly filtered NLFSRs

open access: yesJournal of Mathematical Cryptology, 2013
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali   +3 more
doaj   +1 more source

Pseudorandom Number Generators and the Square Site Percolation Threshold [PDF]

open access: yes, 2008
A select collection of pseudorandom number generators is applied to a Monte Carlo study of the two dimensional square site percolation model. A generator suitable for high precision calculations is identified from an application specific test of ...
B. Bollobás   +10 more
core   +1 more source

Drifting instabilities of cavity solitons in vertical cavity surface-emitting lasers with frequency selective feedback [PDF]

open access: yes, 2009
In this paper we study the formation and dynamics of self-propelled cavity solitons (CSs) in a model for vertical cavity surface-emitting lasers (VCSELs) subjected to external frequency selective feedback (FSF), and build their bifurcation diagram for ...
Colet, P.   +5 more
core   +2 more sources

Absolute Position Coding Method for Angular Sensor—Single-Track Gray Codes

open access: yesSensors, 2018
Single-track Gray codes (STGCs) is a type of absolute position coding method for novel angular sensors, because it has single-track property over traditional Gray codes and mono-difference over linear feedback shift register codes.
Fan Zhang   +4 more
doaj   +1 more source

Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2015
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj  

تحسين خوارزمية MD5 بالاعتماد على عدة طرق

open access: yesمجلة الغري للعلوم الاقتصادية والادارية, 2017
المستخلص خوارزميات Hash  هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية .  هذا البحث يعمل على تعزيز خوارزميةMD5  ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5  هو  استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان   +1 more
doaj   +1 more source

Observations on TETRA Encryption Algorithm TEA-3

open access: yesIACR Transactions on Symmetric Cryptology
We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not ...
Jens Alich   +8 more
doaj   +1 more source

Duality of Channel Encoding and Decoding - Part I: Rate-1 Binary Convolutional Codes

open access: yes, 2016
In this paper, we revisit the forward, backward and bidirectional Bahl-Cocke-Jelinek-Raviv (BCJR) soft-input soft-output (SISO) maximum a posteriori probability (MAP) decoding process of rate-1 binary convolutional codes.
Bahl   +7 more
core   +1 more source

Development Of The Search Method For Non-linear Shift Registers Using Hardware, Implemented On Field Programmable Gate Arrays [PDF]

open access: yes, 2017
The nonlinear feedback shift registers of the second order inare considered, because based on them it can be developed a generator of stream ciphers with enhanced cryptographic strength.Feasibility of nonlinear feedback shift register search is analyzed.
Poluyanenko, N. (Nikolay)
core  

Pseudo Random Coins Show More Heads Than Tails

open access: yes, 2004
Tossing a coin is the most elementary Monte Carlo experiment. In a computer the coin is replaced by a pseudo random number generator. It can be shown analytically and by exact enumerations that popular random number generators are not capable of ...
Bauke, Heiko, Mertens, Stephan
core   +1 more source

Home - About - Disclaimer - Privacy