نتایج جستجو برای: feedback shift register

تعداد نتایج: 310371  

Journal: :IACR Cryptology ePrint Archive 2012
Mohammad Ali Orumiehchiha Josef Pieprzyk Elham Shakour Ron Steinfeld

Rakaposhi is a synchronous stream cipher, which uses three main components a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF ). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV ). NLF takes 8-bit inputs and returns a single outp...

2007
Kefei Chen

Introduction Pseudo-random sequence have been widely used in communication and cryptology. Any (pseudo-) random sequence used in practical system is generated by a machine, a computer or a device, those devices are called (pseudo-) random sequence generator, or PRSG PRSG may be linear feedback shift register, finite automata or some feedback mode using block cipher. Content of this slide what i...

2004
Dimitri Kagaris

– A built–in Test Pattern Generation (TPG) mechanism that is very popular for pseudorandom or pseudo–exhaustive TPG is a shift register whose initial portion is configured as a Linear Feedback Shift Register (LFSR), or some other kind of a Linear Finite State Machine (LFSM). A fundamental problem that exists in this mechanism is the presence of linear dependencies among the bit sequences produc...

Journal: :Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention 2008
Bernhard Kainz Markus Grabner Matthias Rüther

To estimate the pose of a C-Arm during interventions therapy we have developed a small sized X-Ray Target including a special set of beads with known locations in 3D space. Since the patient needs to remain in the X-Ray path for all feasible poses of the C-Arm during the intervention, we cannot construct a single marker which is entirely visible in all images. Therefore finding 2D-3D point corr...

1967
JAMES L. MASSEY

It is shown in this paper that the iterative algorithm introduced by Berlekamp for decoding BCH codes actually provides a general solution to the problem of synthesizing the shortest linear feedback shift register capable of generating a prescribed finite sequence of digits. The shit-register approach leads to a simple proof of the validity of the algorithm as well as providing additional insig...

2012
Slobodan Petrović

Linear Consistency Test (LCT) is a well-known algebraic method of cryptanalysis of stream ciphers. In this paper, we use LCT in an attack on a noised irregularly clocked linear feedback shift register (LFSR). We show that it is possible to reconstruct the initial states of both the clocked and the clocking LFSR in this scheme by using an essentially algebraic attack method, such as LCT, as a bu...

1995
Lutz Voelkel

Signature analysis is an important compact method in digital testing. Applying this method, a test response sequence of a device under test is compressed by a linear feedback shift register (LFSR, for short). Masking occurs if a faulty device yields the same signature as the corresponding good device. Due to the linearity of any LFSR, this happens if and only if the 'error sequence' which is ob...

2007
Myung-Hoon Yang Yongjoon Kim Youngkyu Park Daeyeal Lee Hyunjun Yoon Sungho Kang

An efficient low power built-in self-test methodology based on linear feedback shift register reseeding is proposed. This new method divides each test cube into several blocks and encodes that cube into a new test cube. In the new encoded test cube, the nontransitional blocks which no specified bits is included or only one kind of specified bit (1 or 0) is encoded into only one bit (1, 0, or X)...

1999
S. Lee I.-C. Park C.-M. Kyung

In high-performance processors, the accuracy of branch prediction plays a significant role in enhancing computer execution. A new hardware approach is presented in this paper to dynamically predict branch directions using path information. As an execution path contains large information, we compress the large information using a technique based on the linear feedback shift register (LFSR) that ...

2012
Hanping Hu LingFeng Liu

Pseudorandom binary sequences are widely applied to the various engineering domains such as biology system control, spread spectrum communications and cryptography [1-3]. Particularly, the security of cryptographic systems is strongly contingent on the pseudorandomness of the key stream [3]. Depending on the cryptography application, a sequence is required to present many properties so as to be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید