10   Artículos

 
en línea
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas    
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Luigi Rovito, Andrea De Lorenzo and Luca Manzoni    
Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. However, discovering secure Boolean functions is a non-trivial optimization problem that has been addressed by many optimization technique... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah    
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jiang Ma, Wei Zhao, Yanguo Jia and Haiyang Jiang    
Linear complexity is an important criterion to characterize the unpredictability of pseudo-random sequences, and large linear complexity corresponds to high cryptographic strength. Pseudo-random Sequences with a large linear complexity property are of im... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jose Luis Martin-Navarro and Amparo Fúster-Sabater    
The Internet of Things (IoT) revolution leads to a range of critical services which rely on IoT devices. Nevertheless, they often lack proper security, becoming the gateway to attack the whole system. IoT security protocols often rely on stream ciphers, ... ver más
Revista: Computers    Formato: Electrónico

 
usuarios registrados
Byerly, R. E. Drager, L. D. Lee, J. M.     Pág. 3326 - 3329
Revista: IEEE TRANSACTIONS ON INFORMATION THEORY    Formato: Impreso

« Anterior     Página: 1 de 1     Siguiente »