نتایج جستجو برای: مولد lfsr

تعداد نتایج: 4832  

1999
Thomas Johansson Fredrik Jönsson

This paper describes new methods for fast correlation attacks on stream ciphers, based on techniques used for constructing and decoding the by now famous turbo codes. The proposed algorithm consists of two parts, a preprocessing part and a decoding part. The preprocessing part identi es several parallel convolutional codes, embedded in the code generated by the LFSR, all sharing the same inform...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2020

Journal: :IOP Conference Series: Materials Science and Engineering 2020

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده برق و کامپیوتر 1393

در این پایان نامه به بررسی روش های بازسازی اسکرمبلرهای خطی و مقایسه عملکرد آنها می پردازیم. در سیستم های مخابراتی دیجیتال از اسکرمبلرهای خطی برای شکستن توالی زیادی از بیت های یکسان که شامل صفرها و یک های پشت سرهم می باشند و منجر به مشکلاتی در سنکرون سازی می شوند استفاده می کنند. یک اسکرمبلر خطی شامل یک شیفت رجیستر فیدبکی خطی می باشد که خروجی آن با دنباله ی ورودی موردنظر ترکیب می شود. به طور کلی...

1995
Nur A. Touba Edward J. McCluskey

This paper presents a new approach for on-chip test pattern generation. The set of test patterns generated by a pseudo-random pattern generator (e.g., an LFSR) is transformed into a new set of patterns that provides the desired fault coverage. The trang5ormation is performed by a small amount of mapping logic that decodes sets of patterns that don't detect any new faults and maps them into patt...

2012
Dhrumeel V. Bakshi Patrick R. Schaumont Sandeep K. Shukla

With the increase of device complexity and test-data volume required to guarantee adequate defect coverage, external testing is becoming increasingly difficult and expensive. Logic Built-in Self Test (LBIST) is a viable alternative test strategy as it helps reduce dependence on an elaborate external test equipment, enables the application of a large number of random tests, and allows for at-spe...

1999
Youngkook Kim Saewoong Bahk

| Wireless medium is inherently insecure due to its broadcast characteristics. As wireless communications become more prevalent and utilize the radio channel for transmission of critical information, the concern for security becomes an important issue. In this paper a new CDMA-based multiple access scheme for wireless LANs is proposed to provide enhanced security. Although most of the e orts in...

Journal: :International Conference on Aerospace Sciences and Aviation Technology 1997

Journal: :International journal of electrical and computer engineering systems 2022

One of the most important challenges facing researchers is to find new methods protect data sent over Internet and prevent unauthorized access it. In this paper, we present a method for encrypting image divided into two stages. The first stage requires redistributing positions pixels by using key random numbers generated linear feedback shift registers then deoxyribonucleic acid rules. in previ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید