A BCH error correction scheme applied to FPGA with embedded memory

Y Liu, J Li, H Wang, D Zhang, K Feng, J Li - Frontiers of Information …, 2021 - Springer
Given the potential for bit flip** of data on a memory medium, a high-speed parallel Bose-
Chaudhuri-Hocquenghem (BCH) error correction scheme with modular characteristics …

[PDF][PDF] Information security based on sub-system keys generator by utilizing polynomials method and logic gate

KK Jabbar, HA Hailal, AT Naser - Journal of …, 2023 - … .s3.ap-south-1.amazonaws.com
Abstract Information security is the biggest and most complex problem at present because of
its great impact on modern software in all fields. Therefore, many researchers are working to …

Non‐singular sequence folding‐based pseudorandom key generation algorithm for cryptographic processor

KK Soundra Pandian, KC Ray - Security and Communication …, 2015 - Wiley Online Library
In this paper, a new algorithm to construct the non‐linear‐based Boolean function using non‐
singular sequence folding technique is proposed to generate pseudorandom binary key …

Hardware implementation of dynamic key value based stream cipher using chaotic logistic map

SK Tripathi, KKS Pandian… - 2018 2nd International …, 2018 - ieeexplore.ieee.org
In the last few decades, the relative simplicity of the logistic map made it a widely accepted
point in the consideration of chaos, which is having the good properties of unpredictability …

An algorithm and architecture for non-recursive pseudorandom sequence generation using sequence folding technique

KKS Pandian, KC Ray - International Journal of Computers and …, 2017 - Taylor & Francis
In this paper, a new algorithm along with its first order hardware architecture is proposed to
build the pseudorandom non-recursive binary sequence using sequence folding technique …

Design and Implementation of Dynamic key based stream cipher for cryptographic processor

KKS Pandian, S Pal, KC Ray - 2015 3rd International …, 2015 - ieeexplore.ieee.org
In this paper, a new design for dynamic key based stream cipher is proposed for the
hardware cryptographic applications such as data transmission and information security …

[CITATION][C] 一种应用于带有嵌入式存储器的 FPGA 的 BCH 纠错方案

Y Liu, J Li, H Wang, D Zhang, K Feng, J Li, AY Liu… - Frontiers, 2021

[CITATION][C] Implementation of Dynamic Key Based Stream Cipher using Pipelining in Toeplitz Hash Function

AK Gadige, K Kiran - 2017