نتایج جستجو برای: مولد lfsr
تعداد نتایج: 4832 فیلتر نتایج به سال:
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually referred to as fast correlation attacks, that is very effective if the feedback polynomial has a special form, namely, if its weight is very low. Due to this seminal result, it is a well known fact that one avoids low ...
Recently, numerous algorithms have been developed to tackle the problem of light field super-resolution (LFSR), i.e., super-resolving low-resolution fields gain high-resolution views. Despite delivering encouraging results, these approaches are all convolution-based, and naturally weak in global relation modeling sub-aperture images necessarily characterize inherent structure fields. In this pa...
High-resolution digital elevation model (HR DEM) plays an important role in hydrological analysis, cartographic generalization, and national security. As the main high-precision DEM data supplementary method, super-resolution (DEM SR) based on deep learning has been widely studied. However, its accuracy fallen into a bottleneck at present, which is more prominent complex regions. The reason for...
Reed Solomon codes are very efficient and can with stand the effect of various channel impairments such as noise, interference and fading. The structure of simple LFSR type encoder is complex. Its complexity can be reduced by reducing the complexity of GF(2 m ) field multipliers. Different methods of reducing complexity were studied in this paper.
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI is simple to implement in hardware or software.
Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a new integrating channel coding and cryptography design ...
A recursive attack is presented that is applicable to synchronous stream ciphers consisting of a finite state machine with a linear state-transition function and a multiplexer as output function. A variant of this attack can be used to build a cheap system that bypasses on-line the scrambling of video signals as advised in [1] . 1 The Attacked System The scrambler can be described by a finite s...
With the development of science and technology, many testable design methods have been widely studied and applied to improve the quality of IC testing and reduce cost. Built-in self-test (BIST) is a primary self-test methodology and is widely used for testing VLSI circuits. This method configures circuits for testing itself, with the advantage of low test complexity, short test time, high fault...
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI-128 is simple to implement in hardware or software.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید