A new approach to the development of additive Fibonacci generators based on prime numbers

V Maksymovych, O Harasymchuk, M Karpinski… - Electronics, 2021 - mdpi.com
Pseudorandom number and bit sequence generators are widely used in cybersecurity,
measurement, and other technology fields. A special place among such generators is …

Representations of generalized self-shrunken sequences

SD Cardell, JJ Climent, A Fúster-Sabater, V Requena - Mathematics, 2020 - mdpi.com
Output sequences of the cryptographic pseudo-random number generator, known as the
generalized self-shrinking generator, are obtained self-decimating Pseudo-Noise (PN) …

Interleaving shifted versions of a PN-sequence

SD Cardell, A Fúster-Sabater, V Requena - Mathematics, 2021 - mdpi.com
The output sequence of the shrinking generator can be considered as an interleaving of
determined shifted versions of a single PN-sequence. In this paper, we present a study of …

An efficient algorithm to compute the linear complexity of binary sequences

A Fúster-Sabater, V Requena, SD Cardell - Mathematics, 2022 - mdpi.com
Binary sequences are algebraic structures currently used as security elements in Internet of
Things devices, sensor networks, e-commerce, and cryptography. In this work, a contribution …

Security Analysis of the Symmetric Cryptosystem TinyJambu

A Fúster-Sabater, ME Pazo-Robles - Symmetry, 2024 - mdpi.com
Symmetric cryptography provides the best examples of cryptosystems to be applied in
lightweight environments (eg, IoT). A representative example is the cryptosystem …

Folding-BSD algorithm for binary sequence decomposition

JL Martin-Navarro, A Fúster-Sabater - Computers, 2020 - mdpi.com
The Internet of Things (IoT) revolution leads to a range of critical services which rely on IoT
devices. Nevertheless, they often lack proper security, becoming the gateway to attack the …

Randomness study of the concatenation of generalized sequences

SD Cardell, AB Orúe, V Requena… - Logic Journal of the …, 2022 - academic.oup.com
Keystream sequences should look as random as possible, ie should present no logical
pattern to be exploited in cryptographic attacks. The generalized self-shrinking generator, a …

Покращення статистичних характеристик псевдовипадкових бітових послідовностей модифікованого адитивного генератора Фібоначчі

МВ Кіх, ОА Нємкова - Сучасний захист інформації, 2024 - journals.dut.edu.ua
Анотація Псевдовипадкові бітові послідовності (ПВБП) відіграють ключову роль у
багатьох областях інформаційної безпеки, криптографії та комп'ютерних наук …

Interleaving Shifted Versions of a PN-Sequence

S Díaz Cardell, A Fúster Sabater, V Requena - 2021 - digital.csic.es
The output sequence of the shrinking generator can be considered as an interleaving of
determined shifted versions of a single PN-sequence. In this paper, we present a study of …

Randomness Analysis for GSS-sequences Concatenated

AB Orue - … Conference on Computational Intelligence in Security …, 2020 - books.google.com
Binary sequences produced by a generator should appear as random as possible, that is,
have no logical pattern to be used in cryptographic applications. In this paper, we give a …