|
|
|
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche...
ver más
|
|
|
|
|
|
|
Luigi Rovito, Andrea De Lorenzo and Luca Manzoni
Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. However, discovering secure Boolean functions is a non-trivial optimization problem that has been addressed by many optimization technique...
ver más
|
|
|
|
|
|
|
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw...
ver más
|
|
|
|
|
|
|
Jiang Ma, Wei Zhao, Yanguo Jia and Haiyang Jiang
Linear complexity is an important criterion to characterize the unpredictability of pseudo-random sequences, and large linear complexity corresponds to high cryptographic strength. Pseudo-random Sequences with a large linear complexity property are of im...
ver más
|
|
|
|
|
|
|
Jose Luis Martin-Navarro and Amparo Fúster-Sabater
The Internet of Things (IoT) revolution leads to a range of critical services which rely on IoT devices. Nevertheless, they often lack proper security, becoming the gateway to attack the whole system. IoT security protocols often rely on stream ciphers, ...
ver más
|
|
|
|
|
|
|
Byerly, R. E. Drager, L. D. Lee, J. M.
Pág. 3326 - 3329
|
|
|
|