نتایج جستجو برای: lfsr
تعداد نتایج: 528 فیلتر نتایج به سال:
Recently, numerous algorithms have been developed to tackle the problem of light field super-resolution (LFSR), i.e., super-resolving low-resolution fields gain high-resolution views. Despite delivering encouraging results, these approaches are all convolution-based, and naturally weak in global relation modeling sub-aperture images necessarily characterize inherent structure fields. In this pa...
High-resolution digital elevation model (HR DEM) plays an important role in hydrological analysis, cartographic generalization, and national security. As the main high-precision DEM data supplementary method, super-resolution (DEM SR) based on deep learning has been widely studied. However, its accuracy fallen into a bottleneck at present, which is more prominent complex regions. The reason for...
Reed Solomon codes are very efficient and can with stand the effect of various channel impairments such as noise, interference and fading. The structure of simple LFSR type encoder is complex. Its complexity can be reduced by reducing the complexity of GF(2 m ) field multipliers. Different methods of reducing complexity were studied in this paper.
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI is simple to implement in hardware or software.
Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a new integrating channel coding and cryptography design ...
A recursive attack is presented that is applicable to synchronous stream ciphers consisting of a finite state machine with a linear state-transition function and a multiplexer as output function. A variant of this attack can be used to build a cheap system that bypasses on-line the scrambling of video signals as advised in [1] . 1 The Attacked System The scrambler can be described by a finite s...
With the development of science and technology, many testable design methods have been widely studied and applied to improve the quality of IC testing and reduce cost. Built-in self-test (BIST) is a primary self-test methodology and is widely used for testing VLSI circuits. This method configures circuits for testing itself, with the advantage of low test complexity, short test time, high fault...
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI-128 is simple to implement in hardware or software.
Marsaglia (2003) has described a class of“xorshift”random number generators (RNGs) with periods 2 − 1 for n = 32, 64, etc. We show that the sequences generated by these RNGs are identical to the sequences generated by certain linear feedback shift register (LFSR) generators using “exclusive or” (xor) operations on n-bit words, with a recurrence defined by a primitive polynomial of degree n.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید