نتایج جستجو برای: مولد lfsr

تعداد نتایج: 4832  

2004
Erik Zenner

Pseudorandom generators based on linear feedback shift registers (LFSR) are a traditional building block for cryptographic stream ciphers. In this report, we review the general idea for such generators, as well as the most important techniques of cryptanalysis.

Journal: :CoRR 2012
Amol Bandal Shankar Nawale

In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that’s why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. So...

2007
Makoto Matsumoto Mutsuo Saito Takuji Nishimura Mariko Hagita

Recent personal computers have high-spec CPUs and plenty of memory. The motivation of this study is to take these advantages in designing a tough and fast key-stream generator. Natural controversies on using a large state space for a generator are (1) effectiveness is unclear, (2) slower generation speed, (3) expensive initialization, and (4) costs in a hardware implementation. Our proposal is ...

1995
S. TARNICK

Reprints available directly from the publisher Photocopying permitted by license only (C) 1998 OPA (Overseas Publishers Association) Amsterdam B.V. Published under license under the Gordon and Breach Science Publishers imprint. In self-checking systems, checkers usually do not receive all code words during normal operation. Missing code words may prevent a checker from achieving the totally sel...

2016
Arun Kumar

Low Power consumption has become growing larger for communication systems and battery operated devices. These are laptop computers, multimedia products, and cell phones. For this battery operated devices, the energy consumption is a critical issue for design since it affect the batteries life. Thereby, the reduction of the energy consumption is become one of the most growing topics in the elect...

Journal: :Computational Visual Media 2023

Abstract Light field (LF) cameras record multiple perspectives by a sparse sampling of real scenes, and these provide complementary information. This information is beneficial to LF super-resolution (LFSR). Compared with traditional single-image super-resolution, can exploit parallax structure perspective correlation among different views. Furthermore, the performance existing methods are limit...

2007
Sondre Rønjom Guang Gong Tor Helleseth

The filter generator consists of a linear feedback shift register (LFSR) and a Boolean filtering function that combines some bits from the shift register to create a key stream. A new attack on the filter generator has recently been described by Rønjom and Helleseth [6]. This paper gives an alternative and extended attack to reconstruct the initial state of the LFSR using the underlying subspac...

2006
Anton Tšertov Artur Jutman

The aim of current work is to create training software that would help students in understanding basic and advanced issues related to LFSR-based pseudorandom test pattern generation. The didactic aim of the tool is presenting complicated concepts in a comprehensive graphical way. The main problem that we dealt with during the work on this thesis was to create a tool that represents a simulation...

Journal: :IJWMC 2005
Guang Gong Shaoquan Jiang

In this paper1, we present a new pseudo-random sequence generator, constructed by using two ternary linear feedback shift registers (LFSR). This new generator is called an editing generator which is a combined model of the clock-control generator (viewed as insertion) and the shrinking generator (viewed as deletion). It is shown that the editing generator has good properties of randomness, such...

2005
An Braeken Joseph Lano

A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attacks, (fast) correlation attacks and (fast) algebraic attacks. However, very little is known on the combined effects of these attacks and the resulting cryptographic requirements. In this paper, we present a unified fram...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید