Security analysis of linearly filtered NLFSRs
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali +3 more
doaj +1 more source
Pseudorandom Number Generators and the Square Site Percolation Threshold [PDF]
A select collection of pseudorandom number generators is applied to a Monte Carlo study of the two dimensional square site percolation model. A generator suitable for high precision calculations is identified from an application specific test of ...
B. Bollobás +10 more
core +1 more source
Drifting instabilities of cavity solitons in vertical cavity surface-emitting lasers with frequency selective feedback [PDF]
In this paper we study the formation and dynamics of self-propelled cavity solitons (CSs) in a model for vertical cavity surface-emitting lasers (VCSELs) subjected to external frequency selective feedback (FSF), and build their bifurcation diagram for ...
Colet, P. +5 more
core +2 more sources
Absolute Position Coding Method for Angular Sensor—Single-Track Gray Codes
Single-track Gray codes (STGCs) is a type of absolute position coding method for novel angular sensors, because it has single-track property over traditional Gray codes and mono-difference over linear feedback shift register codes.
Fan Zhang +4 more
doaj +1 more source
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj
تحسين خوارزمية MD5 بالاعتماد على عدة طرق
المستخلص خوارزميات Hash هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية . هذا البحث يعمل على تعزيز خوارزميةMD5 ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5 هو استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان +1 more
doaj +1 more source
Observations on TETRA Encryption Algorithm TEA-3
We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not ...
Jens Alich +8 more
doaj +1 more source
Duality of Channel Encoding and Decoding - Part I: Rate-1 Binary Convolutional Codes
In this paper, we revisit the forward, backward and bidirectional Bahl-Cocke-Jelinek-Raviv (BCJR) soft-input soft-output (SISO) maximum a posteriori probability (MAP) decoding process of rate-1 binary convolutional codes.
Bahl +7 more
core +1 more source
Development Of The Search Method For Non-linear Shift Registers Using Hardware, Implemented On Field Programmable Gate Arrays [PDF]
The nonlinear feedback shift registers of the second order inare considered, because based on them it can be developed a generator of stream ciphers with enhanced cryptographic strength.Feasibility of nonlinear feedback shift register search is analyzed.
Poluyanenko, N. (Nikolay)
core
Pseudo Random Coins Show More Heads Than Tails
Tossing a coin is the most elementary Monte Carlo experiment. In a computer the coin is replaced by a pseudo random number generator. It can be shown analytically and by exact enumerations that popular random number generators are not capable of ...
Bauke, Heiko, Mertens, Stephan
core +1 more source

