نتایج جستجو برای: مولد lfsr

تعداد نتایج: 4832  

2004
Richard P. Brent

Marsaglia (2003) has described a class of“xorshift”random number generators (RNGs) with periods 2 − 1 for n = 32, 64, etc. We show that the sequences generated by these RNGs are identical to the sequences generated by certain linear feedback shift register (LFSR) generators using “exclusive or” (xor) operations on n-bit words, with a recurrence defined by a primitive polynomial of degree n.

Journal: :IEEE Transactions on Computers 2023

We construct a strong physical unclonable function (PUF) with provable security against machine learning (ML) attacks on both classical and quantum computers. The is guaranteed by the cryptographic hardness of decryption functions public-key cryptosystems, learning-with-errors (LWE) problem defined integer lattices. call our construction lattice PUF. PUF physically obfuscated key an LWE block. ...

Journal: :IEEE Transactions on Instrumentation and Measurement 2022

Despite the recent progress in light field super-resolution (LFSR) achieved by convolutional neural networks, correlation information of LF images has not been sufficiently studied and exploited due to complexity 4-D data. To cope with such high-dimensional data, most existing LFSR methods resorted decomposing it into lower dimensions subsequently performing optimization on decomposed subspaces...

2015
A. Madhuri

The technique of Test pattern generation plays a key role in Built-In-Self-Test(BIST) architecture implementation. Main problem with any test pattern generator is to produce extended, random path succession which is applied to Circuit Under Test(CUT) for detecting faults. As real long numbers can be acquired as a part of physical developments only, these are complex to be employed inactual appl...

2002
François Arnault Thierry P. Berger Abdelkader Necer

A New Class of Stream Ciphers Combining LFSR and FCSR Architectures 22 François Arnault, Thierry P. Berger, and Abdelkader Necer Slide Attack on Spectr-H64 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Selçuk Kavut and Melek D. Yücel On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract) . . . . . . ....

Journal: :IACR Cryptology ePrint Archive 2002
Gregory G. Rose Philip Hawkes

This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFSR generator based on that of SOBER [21] with a keyed mixing function reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael [6], Twofish [23], tc24 [24] and SAFER++ [17].

Journal: :The Journal of the Korean Institute of Information and Communication Engineering 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید