نتایج جستجو برای: bit swapping linear feedback shift register bs
تعداد نتایج: 830261 فیلتر نتایج به سال:
Decim is a hardware oriented stream cipher with 80-bit key and 64-bit IV which was submitted to the ECRYPT stream cipher project. The design of Decim is based on both a nonlinear filter LFSR and an irregular decimation mechanism called the ABSG. As a consequence, Decim is of low hardware complexity. Recently, Hongjun Wu and Bart Preneel pointed out two flaws in the stream cipher Decim. The firs...
A deterministic BIST scheme is presented which requires less hardware overhead than pseudo-random BIST but obtains better or even complete fault coverage at the same time. It takes advantage of the fact that any autonomous BIST scheme needs a BIST control unit for indicating the completion of the self-test at least. Hence, pattern counters and bit counters are always available, and they provide...
A general framework for the design of feedback registers based on algebra over complete rings is described. These registers generalize linear feedback shift registers and feedback with carry shift registers. Basic properties of the output sequences are studied: relations to the algebra of the underlying ring; synthesis of the register from the sequence (which has implications for cryptanalysis)...
Various measures of security of stream ciphers have been studied that are based on the problem of finding a minimum size generator for the keystream in some special class of generators. These include linear and p-adic spans, as well as π-adic span, which is based on a choice of an element π in a finite extension of the integers. The corresponding sequence generators are known as linear feedback...
Let x be an m-sequence, a maximal length sequence produced by a linear feedback shift register. We show that the nondeterministic automatic complexity AN (x) is close to maximal: n/2 − AN (x) = O(log 2 n), whereas Hyde has shown AN (y) ≤ n/2 + 1 for all sequences y.
Power dissipation is a challenging problem in current VLSI designs. In general the power consumption of device is more in the testing mode than in the normal system operation. Built in self test (BIST) and scan-based BIST are the techniques used for testing and detecting the faulty components in the VLSI circuit. Linear Feedback Shift Register (LFSR) in BIST generates pseudo-random patterns for...
| Wireless medium is inherently insecure due to its broadcast characteristics. As wireless communications become more prevalent and utilize the radio channel for transmission of critical information, the concern for security becomes an important issue. In this paper a new CDMA-based multiple access scheme for wireless LANs is proposed to provide enhanced security. Although most of the e orts in...
In order to ensure a high product quality some authors propose pseudo-exhaustive or verification testing. This is applicable if each primary output of the combinational circuit only depends on a small set of primary inputs, where all possible patterns can be enumerated completely. But in CMOS-circuits even a single stuck-open fault may fail to be detected this way, and the already proposed addi...
Reuse of design or hardware components has become Essential to meet shrinking time-to-market and more Integration on a single chip as per the customer’s specifications at low cost. Circuit components in electronic form and hardware components are reused, and these constitute Intellectual Property (IP) core. In order to ensure trustworthy yet leakageproof public verification based on the marks h...
1 I n t r o d u c t i o n In several applications in modern communication systems periodic binary sequences are employed that must be difficult for an adversary to determine when a short subsequence is known, and must be easy to generate given a secret key. This is true both in stream cypher systems, in which the binary sequence is used as a pseudo-one-time-pad [11], and in secure spread spectr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید