نتایج جستجو برای: مولد lfsr

تعداد نتایج: 4832  

Journal: :IACR Cryptology ePrint Archive 2010
Sui-Guan Teo Leonie Ruth Simpson Ed Dawson

Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms. They consist of a Linear Feedback Shift Register (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the m-tuple output of a no...

2002
Sabine Leveiller Gilles Zémor Philippe Guillot Joseph Jean Boutros

We present a new cryptanalytic attack on PN-generators filtered by a Boolean function. The key-idea is to jointly combine the knowledge of the Boolean function and the LFSR structure so as to introduce a new iterative decoding technique. The results we obtained prove to be very good: indeed, even in the case of systems for which classical iterative algorithms appear powerless, our scheme enable...

2009
Shikha Kakar Balwinder Singh Arun Khosla

The increasing growth of sub-micron technology has resulted in the difficulty of VLSI testing. Test and design for testability are recognized today as critical to a successful design. Built-in-SelfTest (BIST) is becoming an alternative solution to the rising costs of external electrical testing and increasing complexity of devices Small increase in the cost of system reduces large testing cost....

2004
Petr Fišer Hana Kubátová

A test-per-clock BIST method for combinational or full-scan circuits is proposed. The method is based on a design of a combinational block the decoder, transforming pseudo-random LFSR code words into deterministic test patterns. A Column-Matching algorithm to design the decoder is proposed. The Column-Matching method modified to support a mixed-mode BIST is proposed as well. Here the BIST is di...

Journal: :International Journal of Embedded Systems 2018

Journal: :Academic journal of science and technology 2022

With the increasing scale and complexity of internal circuit, function chip is more powerful, but it will bring serious problems to test chip. The power consumption in mode much higher than that normal working mode, especially process built-in self-test, excessive damage circuit under lead failure low vector generation technology reduces by preprocessing set. However, modification set results c...

Journal: :CoRR 2011
Maaly Awad S. Hassan Ibrahim Soliman I Abuhaiba

This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. The novelty of this work lies in deploying the concept of keyed discrete Fourier transform (DFT) followed by DE operations for encryption purpose. To this end, a secret key is shared between both encryption and decryption sides. Firstly two d...

2009
C N Khairnar Raj Kamal Sanjiv Tokekar

The LFSR operations are performed in implementing the different mobile-device protocols and encryption standards during transmission and reception. These operations are performed at the PN coding stages in CDMA, Gold code generation stage in WCDMA and several operation stages in the mobile transmitter and receiver protocols in Software Defined Radios (SDRs). A kernel can instantiate several pro...

Journal: :J. Electronic Testing 2008
Hong-Sik Kim Sungho Kang Michael S. Hsiao

A new scan architecture for both low power testing and test volume compression is proposed. For low power test requirements, only a subset of scan cells is loaded with test stimulus and captured with test responses by freezing the remaining scan cells according to the distribution of unspecified bits in the test cubes. In order to optimize the proposed process, a novel graph-based heuristic is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید