نتایج جستجو برای: مولد lfsr

تعداد نتایج: 4832  

2014
Aditi Bhateja Shailender Kumar Himanshu Chaudhary

With the increasing usage of internet, the need of securing the information is also getting more important. The most widely used technique to make the information secure is cryptography. Cryptanalysis is a method to break the unreadable cipher text without having the key. This paper describes a method of deciphering encrypted messages of Vigenere cipher cryptosystems, Simple substitution crypto...

2005
Anne Canteaut

The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generators. Here, we describe this type of attacks and we present some open problems related to their complexity. We also investigate the design criteria which may guarantee a high resistance to algebraic attacks for keystream generator...

Journal: :International Journal on Advanced Science, Engineering and Information Technology 2011

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق 1392

ژنراتورهای معمول مورد استفاده در توربین بادی، ژنراتور سنکرون با آهنربای دائم و ژنراتور القایی است. اما هزینه زیاد ژنراتور سنکرون و بازده کم ژنراتور القایی باعث می شود که از ژنراتورهای دیگری استفاده شود. استفاده از ژنراتور با برجستگی دو طرفه دو مزیت مهم را به همراه دارد، اولاً اینکه ژنراتور سرعت متغیر است و نسبت به ژنراتور سرعت ثابت انرژی بیشتری را تبدیل می کند ثانیاً به دلیل اینکه تعداد قطب های ا...

1993
Hugo Krawczyk

The Shrinking Generator, presented at Crypto'93, is a LFSR-based pseudorandom generator suitable for the implementation of additive stream ciphers. It is particularly simple and has attractive security properties. (The reader is referred to [1] for the definition of the generator and its properties). Although the algorithm was originally intended for hardware implementation, here we will focus ...

Journal: :IEEE Trans. Information Theory 2009
Enes Pasalic

In this work, the performance of probabilistic algebraic attacks is compared to classical (fast) algebraic attacks in the context of their application to certain linear beedback shift register (LFSR)-based stream ciphers. Using some results from coding theory it is shown that in terms of time complexity classical deterministic algebraic attacks are in general a more efficient cryptanalytic tool...

2013
Navdeep Kaur Neeru Malhotra

In today’s Integrated Circuits (ICs), Built-In-Self Test (BIST) is becoming increasingly important as designs become more complicated. BIST is a design technique that allows a circuit to test itself Test pattern generator (TPG) using Linear Feedback Shift Resister (LFSR) is proposed which is more suitable for BIST architecture.In this paper we have design ALU (arithmetic and logic unit) in VHDL...

Journal: :J. Inf. Sci. Eng. 2002
Jun-Cheol Jeon Hyun-Sung Kim Hyoung-Mok Lee Kee-Young Yoo

This paper presents a new multiplication algorithm and, based on this algorithm, proposes a hardware architecture, called Modified Inner-Product Multiplier (MIPM), which computes AB multiplication based on a Linear Feedback Shift Register (LFSR). The algorithm is based on the property of the irreducible all one polynomial (AOP) over the finite field GF(2). The proposed architecture reduces the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید