On determination of LFSR structures to assure more reliable and secure designs of cryptographic systems
暂无分享,去创建一个
[1] M. J. Al-Mushrafi,et al. Design and study of a strong crypto-system model for e-Commerce , 2002 .
[2] Vera Pless,et al. Encryption Schemes for Computer Confidentiality , 1977, IEEE Transactions on Computers.
[3] N. K. Nanda,et al. Shift register modification for multipurpose use in combinational circuit testing , 1989 .
[4] Afaq Ahmad. Development of State Model Theory for External Exclusive NOR Type LFSR Structures , 2007 .
[5] Afaq Ahmad,et al. Constant error masking behavior of an internal exclusive-OR type signature analyzer due to the changed polynomial seeds , 2002, Comput. Electr. Eng..
[6] Afaq Ahmad,et al. Design of a Realistic Test Simulator For a Built-In Self Test Environment , 2010 .
[7] Afaq Ahmad. Investigation of some quite interesting divisibility situations in a signature analyzer implementation , 2011 .
[8] A. Ahmad,et al. On locking conditions in m-sequence generators for the use in digital watermarking , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).
[9] Chi-Chun Lo,et al. Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..
[10] Ahmed Al-Maashri,et al. Investigating some special sequence lengths generated in an external exclusive-NOR type LFSR , 2008, Comput. Electr. Eng..
[11] Afaq Ahmad. Critical role of polynomial seeds on the effectiveness of an LFSR-based testing technique , 1994 .
[12] Chung-Huang Yang,et al. Pseudorandom bit generators in stream-cipher cryptography , 1991, Computer.
[13] Thomas Siegenthaler,et al. Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.
[14] R. A. Rueppel. Analysis and Design of Stream Ciphers , 2012 .
[15] N. K. Nanda,et al. The use of irreducible characteristic polynomials in an LFSR based testing of digital circuits , 1989, Fourth IEEE Region 10 International Conference TENCON.
[16] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[17] Afaq Ahmad,et al. An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences , 1997 .
[18] Afaq Ahmad,et al. STUDY AND IMPLEMENTATION OF PROPERTIES OF m-SEQUENCE IN MATLAB- SIMULINK - A PASS / FAIL TEST TOOL FOR DESIGNS OF RANDOM GENERATORS , 2001 .
[19] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[20] Ali Al-Lawati,et al. Realization of a Simplified Controllability Computation Procedure: a MATLAB- SIMULINK Based Tool , 2003 .
[21] Joos Vandewalle,et al. Chaotic versus classical stream ciphers-a comparative study , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).
[22] S. J. Shepherd. Public key stream ciphers , 1994 .
[23] A. Ahmad,et al. A new algorithmic procedure to test m-sequence generating feedback connections of stream cipher's LFSRs , 2001, Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology. TENCON 2001 (Cat. No.01CH37239).
[24] Jovan Đ. Golić. Recent Advances in Stream Cipher Cryptanalysis , 1998 .
[25] A. Ahmad,et al. A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Test Pattern Generator and Multi-Input Shift Register (MISR) , 2010, VLSIC 2010.
[26] Tariq Jamil,et al. An investigation into the application of linear feedback shift registers for steganography , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).
[27] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[28] A. Ahmad. Achievement of higher testability goals through the modification of shift registers in LFSR-based testing , 1997 .