A BCH error correction scheme applied to FPGA with embedded memory
Y Liu, J Li, H Wang, D Zhang, K Feng, J Li - Frontiers of Information …, 2021 - Springer
Given the potential for bit flip** of data on a memory medium, a high-speed parallel Bose-
Chaudhuri-Hocquenghem (BCH) error correction scheme with modular characteristics …
Chaudhuri-Hocquenghem (BCH) error correction scheme with modular characteristics …
[PDF][PDF] Information security based on sub-system keys generator by utilizing polynomials method and logic gate
KK Jabbar, HA Hailal, AT Naser - Journal of …, 2023 - … .s3.ap-south-1.amazonaws.com
Abstract Information security is the biggest and most complex problem at present because of
its great impact on modern software in all fields. Therefore, many researchers are working to …
its great impact on modern software in all fields. Therefore, many researchers are working to …
Non‐singular sequence folding‐based pseudorandom key generation algorithm for cryptographic processor
KK Soundra Pandian, KC Ray - Security and Communication …, 2015 - Wiley Online Library
In this paper, a new algorithm to construct the non‐linear‐based Boolean function using non‐
singular sequence folding technique is proposed to generate pseudorandom binary key …
singular sequence folding technique is proposed to generate pseudorandom binary key …
Hardware implementation of dynamic key value based stream cipher using chaotic logistic map
In the last few decades, the relative simplicity of the logistic map made it a widely accepted
point in the consideration of chaos, which is having the good properties of unpredictability …
point in the consideration of chaos, which is having the good properties of unpredictability …
An algorithm and architecture for non-recursive pseudorandom sequence generation using sequence folding technique
KKS Pandian, KC Ray - International Journal of Computers and …, 2017 - Taylor & Francis
In this paper, a new algorithm along with its first order hardware architecture is proposed to
build the pseudorandom non-recursive binary sequence using sequence folding technique …
build the pseudorandom non-recursive binary sequence using sequence folding technique …
Design and Implementation of Dynamic key based stream cipher for cryptographic processor
In this paper, a new design for dynamic key based stream cipher is proposed for the
hardware cryptographic applications such as data transmission and information security …
hardware cryptographic applications such as data transmission and information security …
[CITATION][C] 一种应用于带有嵌入式存储器的 FPGA 的 BCH 纠错方案
Y Liu, J Li, H Wang, D Zhang, K Feng, J Li, AY Liu… - Frontiers, 2021
[CITATION][C] Implementation of Dynamic Key Based Stream Cipher using Pipelining in Toeplitz Hash Function
AK Gadige, K Kiran - 2017