نتایج جستجو برای: مولد lfsr
تعداد نتایج: 4832 فیلتر نتایج به سال:
This paper describes new methods for fast correlation attacks on stream ciphers, based on techniques used for constructing and decoding the by now famous turbo codes. The proposed algorithm consists of two parts, a preprocessing part and a decoding part. The preprocessing part identi es several parallel convolutional codes, embedded in the code generated by the LFSR, all sharing the same inform...
در این پایان نامه به بررسی روش های بازسازی اسکرمبلرهای خطی و مقایسه عملکرد آنها می پردازیم. در سیستم های مخابراتی دیجیتال از اسکرمبلرهای خطی برای شکستن توالی زیادی از بیت های یکسان که شامل صفرها و یک های پشت سرهم می باشند و منجر به مشکلاتی در سنکرون سازی می شوند استفاده می کنند. یک اسکرمبلر خطی شامل یک شیفت رجیستر فیدبکی خطی می باشد که خروجی آن با دنباله ی ورودی موردنظر ترکیب می شود. به طور کلی...
This paper presents a new approach for on-chip test pattern generation. The set of test patterns generated by a pseudo-random pattern generator (e.g., an LFSR) is transformed into a new set of patterns that provides the desired fault coverage. The trang5ormation is performed by a small amount of mapping logic that decodes sets of patterns that don't detect any new faults and maps them into patt...
With the increase of device complexity and test-data volume required to guarantee adequate defect coverage, external testing is becoming increasingly difficult and expensive. Logic Built-in Self Test (LBIST) is a viable alternative test strategy as it helps reduce dependence on an elaborate external test equipment, enables the application of a large number of random tests, and allows for at-spe...
| Wireless medium is inherently insecure due to its broadcast characteristics. As wireless communications become more prevalent and utilize the radio channel for transmission of critical information, the concern for security becomes an important issue. In this paper a new CDMA-based multiple access scheme for wireless LANs is proposed to provide enhanced security. Although most of the e orts in...
One of the most important challenges facing researchers is to find new methods protect data sent over Internet and prevent unauthorized access it. In this paper, we present a method for encrypting image divided into two stages. The first stage requires redistributing positions pixels by using key random numbers generated linear feedback shift registers then deoxyribonucleic acid rules. in previ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید