Encrypted biography of biomedical image-a pentalayer cryptosystem on FPGA

D Ravichandran, S Rajagopalan, HN Upadhyay… - Journal of Signal …, 2019 - Springer
Secure transmission of medical information occupies a crucial role in the world of
telemedicine applications. Reconfigurable hardware implementation offers several …

A secure LFSR based random measurement matrix for compressive sensing

SN George, DP Pattathil - Sensing and Imaging, 2014 - Springer
In this paper, a novel approach for generating the secure measurement matrix for
compressive sensing (CS) based on linear feedback shift register (LFSR) is presented. The …

[PDF][PDF] An analysis of linear feedback shift registers in stream ciphers

F Masoodi, S Alam, MU Bokhari - International Journal of Computer …, 2012 - academia.edu
ABSTRACT Linear Feedback Shift Registers (LFSRs) have always received considerable
attention in cryptography. Owing to the good statistical properties, large period and low …

[PDF][PDF] A proposal video encryption using light stream algorithm

AR Alawi, NF Hassan - Engineering and Technology Journal, 2021 - iasj.net
The need for protecting the secret information from the un-authorized users has been led to
applying a lot of encryption approaches. However, there is high importance in ciphering the …

Audio security through compressive sampling and cellular automata

SN George, N Augustine, DP Pattathil - Multimedia Tools and Applications, 2015 - Springer
In this paper, a new approach for scrambling the compressive sensed (CS) audio data using
two dimensional cellular automata is presented. In order to improve the security, linear …

Dynamic linear feedback shift registers: A review

FMA Eljadi, IFT Al Shaikhli - The 5th International Conference …, 2014 - ieeexplore.ieee.org
An improvement in the security of stream cipher is achieved by introducing dynamic
polynomial switching in the Linear Feedback Shift Registers. Several researches declared …

[PDF][PDF] Design of keystream Generator utilizing Firefly Algorithm

MS Mahdi, NF Hassan - Journal of Al-Qadisiyah for computer science and …, 2018 - iasj.net
Stream cipher is one of encryption procedures for sending data in internet; stream cipher is
suitable in telecommunications and real-time apps. The robustness measurement of stream …

Performance evaluation of highly efficient techniques for software implementation of LFSR

O Delgado-Mohatar, A Fúster-Sabater… - Computers & Electrical …, 2011 - Elsevier
Linear feedback shift registers (LFSR) are widely used in many different areas. In this paper,
we study the operation of LFSR defined over extension fields GF (2n), instead of traditional …

Pseudo-random generators using linear feedback shift registers with output extraction

H Nobach - arxiv preprint arxiv:2404.12011, 2024 - arxiv.org
The use of three extractors, fed by linear feedback shift registers (LFSR) for generating
pseudo-random bit streams is investigated. Specifically, a standard LFSR is combined with a …

[LIVRE][B] SAFE-NET: Secure and Fast Encryption using Network of Pseudo-Random Number Generators

J McCurdy - 2023 - search.proquest.com
We propose a general framework to design a general class of random number generators
suitable for both computer simulation and computer security applications. It can include …