نتایج جستجو برای: مولد lfsr

تعداد نتایج: 4832  

2004
Håkan Englund Martin Hell Thomas Johansson

In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually referred to as fast correlation attacks, that is very effective if the feedback polynomial has a special form, namely, if its weight is very low. Due to this seminal result, it is a well known fact that one avoids low ...

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2022

Recently, numerous algorithms have been developed to tackle the problem of light field super-resolution (LFSR), i.e., super-resolving low-resolution fields gain high-resolution views. Despite delivering encouraging results, these approaches are all convolution-based, and naturally weak in global relation modeling sub-aperture images necessarily characterize inherent structure fields. In this pa...

Journal: :IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2023

High-resolution digital elevation model (HR DEM) plays an important role in hydrological analysis, cartographic generalization, and national security. As the main high-precision DEM data supplementary method, super-resolution (DEM SR) based on deep learning has been widely studied. However, its accuracy fallen into a bottleneck at present, which is more prominent complex regions. The reason for...

2013
Amandeep Singh Mandeep Kaur

Reed Solomon codes are very efficient and can with stand the effect of various channel impairments such as noise, interference and fading. The structure of simple LFSR type encoder is complex. Its complexity can be reduced by reducing the complexity of GF(2 m ) field multipliers. Different methods of reducing complexity were studied in this paper.

2000

The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI is simple to implement in hardware or software.

2013
Supriya Goel

Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a new integrating channel coding and cryptography design ...

1993
Joan Daemen René Govaerts

A recursive attack is presented that is applicable to synchronous stream ciphers consisting of a finite state machine with a linear state-transition function and a multiplexer as output function. A variant of this attack can be used to build a cheap system that bypasses on-line the scrambling of video signals as advised in [1] . 1 The Attacked System The scrambler can be described by a finite s...

2015
J. Hu

With the development of science and technology, many testable design methods have been widely studied and applied to improve the quality of IC testing and reduce cost. Built-in self-test (BIST) is a primary self-test methodology and is widely used for testing VLSI circuits. This method configures circuits for testing itself, with the advantage of low test complexity, short test time, high fault...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

2000
E. Dawson A. Clark J. Golić W. Millan L. Penna L. Simpson

The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI-128 is simple to implement in hardware or software.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید