PCBChain: Lightweight reconfigurable blockchain primitives for secure IoT applications
In the era of ubiquitous intelligence, the Internet of Things (IoT) holds the promise as a
breakthrough technology to enable diverse applications that benefit societal problems. Yet …
breakthrough technology to enable diverse applications that benefit societal problems. Yet …
Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map
A new method for the generation of pseudorandom numbers, based on two linear feedback
shift registers (LFSRs) and a discrete-space chaotic map is presented. The proposed …
shift registers (LFSRs) and a discrete-space chaotic map is presented. The proposed …
Performance of software and hardware oriented lightweight stream cipher in constraint environment: A review
MU Bokhari, S Afzal - 2023 10th international conference on …, 2023 - ieeexplore.ieee.org
The internet has advanced significantly in the modern era, with millions of IOT devices
connected to one another and exchanging enormous amounts of data. But several types of …
connected to one another and exchanging enormous amounts of data. But several types of …
[PDF][PDF] Cryptanalysis techniques for stream cipher: a survey
Stream Ciphers are one of the most important cryptographic techniques for data security due
to its efficiency in terms of resources and speed. This study aims to provide a comprehensive …
to its efficiency in terms of resources and speed. This study aims to provide a comprehensive …
Dynamic linear feedback shift registers: A review
An improvement in the security of stream cipher is achieved by introducing dynamic
polynomial switching in the Linear Feedback Shift Registers. Several researches declared …
polynomial switching in the Linear Feedback Shift Registers. Several researches declared …
Symmetric algorithms I
This chapter explores basic concepts of symmetric key cryptography. The knowledge of
encryption key is implicitly or explicitly equivalent to knowing the decryption key. These …
encryption key is implicitly or explicitly equivalent to knowing the decryption key. These …
[PDF][PDF] Linear Feedback Shift Registers-Based Randomization for Image Steganography
MA Hussein, S Al-Momen - Iraqi Journal of Science, 2023 - iasj.net
Steganography involves concealing information by embedding data within cover media and
it can be categorized into two main domains: spatial and frequency. This paper presents two …
it can be categorized into two main domains: spatial and frequency. This paper presents two …
[PDF][PDF] Two level image encryption using pseudo random number generators
V Kapur, ST Paladi, N Dubbakula - International Journal of Computer …, 2015 - academia.edu
The escalating significance of securing data over the network has encouraged development
of secure encryption algorithms. Cryptography is a technique that assists in development of …
of secure encryption algorithms. Cryptography is a technique that assists in development of …
New design of efficient non-linear stream key generator
SA Shaker, AG Nasir, FH Ali - AIP Conference Proceedings, 2023 - pubs.aip.org
In this paper we will design a new key generator (KG) depends on the LFSR unit and chaotic
map. The designed KG can be used for many purposes, like cryptography and …
map. The designed KG can be used for many purposes, like cryptography and …
Building Trust: IoT Security and Blockchain Integration
Blockchain technology has captured considerable attention in recent years due to its unique
potential to reshape the financial industry. This innovative breakthrough is increasingly …
potential to reshape the financial industry. This innovative breakthrough is increasingly …