A new approach to the development of additive Fibonacci generators based on prime numbers
V Maksymovych, O Harasymchuk, M Karpinski… - Electronics, 2021 - mdpi.com
Pseudorandom number and bit sequence generators are widely used in cybersecurity,
measurement, and other technology fields. A special place among such generators is …
measurement, and other technology fields. A special place among such generators is …
Representations of generalized self-shrunken sequences
Output sequences of the cryptographic pseudo-random number generator, known as the
generalized self-shrinking generator, are obtained self-decimating Pseudo-Noise (PN) …
generalized self-shrinking generator, are obtained self-decimating Pseudo-Noise (PN) …
Interleaving shifted versions of a PN-sequence
The output sequence of the shrinking generator can be considered as an interleaving of
determined shifted versions of a single PN-sequence. In this paper, we present a study of …
determined shifted versions of a single PN-sequence. In this paper, we present a study of …
An efficient algorithm to compute the linear complexity of binary sequences
Binary sequences are algebraic structures currently used as security elements in Internet of
Things devices, sensor networks, e-commerce, and cryptography. In this work, a contribution …
Things devices, sensor networks, e-commerce, and cryptography. In this work, a contribution …
Security Analysis of the Symmetric Cryptosystem TinyJambu
A Fúster-Sabater, ME Pazo-Robles - Symmetry, 2024 - mdpi.com
Symmetric cryptography provides the best examples of cryptosystems to be applied in
lightweight environments (eg, IoT). A representative example is the cryptosystem …
lightweight environments (eg, IoT). A representative example is the cryptosystem …
Folding-BSD algorithm for binary sequence decomposition
JL Martin-Navarro, A Fúster-Sabater - Computers, 2020 - mdpi.com
The Internet of Things (IoT) revolution leads to a range of critical services which rely on IoT
devices. Nevertheless, they often lack proper security, becoming the gateway to attack the …
devices. Nevertheless, they often lack proper security, becoming the gateway to attack the …
Randomness study of the concatenation of generalized sequences
Keystream sequences should look as random as possible, ie should present no logical
pattern to be exploited in cryptographic attacks. The generalized self-shrinking generator, a …
pattern to be exploited in cryptographic attacks. The generalized self-shrinking generator, a …
Покращення статистичних характеристик псевдовипадкових бітових послідовностей модифікованого адитивного генератора Фібоначчі
МВ Кіх, ОА Нємкова - Сучасний захист інформації, 2024 - journals.dut.edu.ua
Анотація Псевдовипадкові бітові послідовності (ПВБП) відіграють ключову роль у
багатьох областях інформаційної безпеки, криптографії та комп'ютерних наук …
багатьох областях інформаційної безпеки, криптографії та комп'ютерних наук …
Interleaving Shifted Versions of a PN-Sequence
S Díaz Cardell, A Fúster Sabater, V Requena - 2021 - digital.csic.es
The output sequence of the shrinking generator can be considered as an interleaving of
determined shifted versions of a single PN-sequence. In this paper, we present a study of …
determined shifted versions of a single PN-sequence. In this paper, we present a study of …
Randomness Analysis for GSS-sequences Concatenated
AB Orue - … Conference on Computational Intelligence in Security …, 2020 - books.google.com
Binary sequences produced by a generator should appear as random as possible, that is,
have no logical pattern to be used in cryptographic applications. In this paper, we give a …
have no logical pattern to be used in cryptographic applications. In this paper, we give a …