نتایج جستجو برای: shift register

تعداد نتایج: 166701  

2007
Yong Ki Lee Ingrid Verbauwhede

We propose a compact architecture of a Montgomery elliptic curve scalar multiplier in a projective coordinate system over GF (2). To minimize the gate area of the architecture, we use the common Z projective coordinate system where a common Z value is kept for two elliptic curve points during the calculations, which results in one register reduction. In addition, by reusing the registers we are...

2010
MIROSLAW MALEK

A fail-soft and easily reconfigurable interconnection network is proposed that can function like a bus or like a shift register ring. Its performance as a bus exceeds the performance of an Ethernet, and its performance as a ring is similar to that of a distributed local computer network (DLCN). It can be reconfigured to a sufficient degree to prune out faults or to partition the network into su...

Journal: :IACR Cryptology ePrint Archive 2016
Ming Li Dongdai Lin

We consider the adjacency graphs of linear feedback shift registers (LFSRs) with reducible characteristic polynomials. Let l(x) be a characteristic polynomial, and l(x) = l1(x)l2(x) · · · lr(x) be a decomposition of l(x) into co-prime factors. Firstly, we show a connection between the adjacency graph of FSR(l(x)) and the association graphs of FSR(li(x)), 1 ≤ i ≤ r. By this connection, the probl...

Journal: :Des. Codes Cryptography 1999
Paul Camion Anne Canteaut

We extend the notions of correlation-immune functions and resilient functions to functions over any finite alphabet. A previous result due to Gopalakrishnan and Stinson is generalized as we give an orthogonal array characterization, a Fourier transform and a matrix characterization for correlation-immune and resilient functions over any finite alphabet endowed with the structure of an Abelian g...

2013
S. Abishek Venkadesh Mr. Ruban

Reuse of design or hardware components has become Essential to meet shrinking time-to-market and more Integration on a single chip as per the customer’s specifications at low cost. Circuit components in electronic form and hardware components are reused, and these constitute Intellectual Property (IP) core. In order to ensure trustworthy yet leakageproof public verification based on the marks h...

2016
Sabiha F. Jawad

The main aim of this chapter is to provide a security evaluation method based on fuzzy logic “for a pseudo-random sequences used (mainly) in stream cipher systems. The designed Fuzzy rules consider two main parameters, which are the length of the maximum period of the key sequence obtained from Linear Feedback Shift Register (LFSR) and the entropy of the result in sequences obtained from differ...

2007
Kefei Chen

Introduction Pseudo-random sequence have been widely used in communication and cryptology. Any (pseudo-) random sequence used in practical system is generated by a machine, a computer or a device, those devices are called (pseudo-) random sequence generator, or PRSG PRSG may be linear feedback shift register, finite automata or some feedback mode using block cipher. Content of this slide what i...

2004
Dimitri Kagaris

– A built–in Test Pattern Generation (TPG) mechanism that is very popular for pseudorandom or pseudo–exhaustive TPG is a shift register whose initial portion is configured as a Linear Feedback Shift Register (LFSR), or some other kind of a Linear Finite State Machine (LFSM). A fundamental problem that exists in this mechanism is the presence of linear dependencies among the bit sequences produc...

Journal: :Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention 2008
Bernhard Kainz Markus Grabner Matthias Rüther

To estimate the pose of a C-Arm during interventions therapy we have developed a small sized X-Ray Target including a special set of beads with known locations in 3D space. Since the patient needs to remain in the X-Ray path for all feasible poses of the C-Arm during the intervention, we cannot construct a single marker which is entirely visible in all images. Therefore finding 2D-3D point corr...

2007
David Garrett Mircea Stan

David Garrett and Mircea Stan [email protected], [email protected] University of Virginia, Department of Electrical Engineering AbstractDirect Sequence Spread Spectrum (DSSS) transmissions require a despreading stage within the standard receiver block to recover the spread spectrum signal. For long spread spectrum codes, the correlation block can be a large portion of the receiver size, he...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید