PCBChain: Lightweight reconfigurable blockchain primitives for secure IoT applications

W Yan, N Zhang, LL Njilla… - IEEE Transactions on Very …, 2020 - ieeexplore.ieee.org
In the era of ubiquitous intelligence, the Internet of Things (IoT) holds the promise as a
breakthrough technology to enable diverse applications that benefit societal problems. Yet …

Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map

HS Alhadawi, MF Zolkipli, SM Ismail, D Lambić - Cryptologia, 2019 - Taylor & Francis
A new method for the generation of pseudorandom numbers, based on two linear feedback
shift registers (LFSRs) and a discrete-space chaotic map is presented. The proposed …

Performance of software and hardware oriented lightweight stream cipher in constraint environment: A review

MU Bokhari, S Afzal - 2023 10th international conference on …, 2023 - ieeexplore.ieee.org
The internet has advanced significantly in the modern era, with millions of IOT devices
connected to one another and exchanging enormous amounts of data. But several types of …

[PDF][PDF] Cryptanalysis techniques for stream cipher: a survey

MU Bokhari, S Alam, FS Masoodi - International Journal of Computer …, 2012 - Citeseer
Stream Ciphers are one of the most important cryptographic techniques for data security due
to its efficiency in terms of resources and speed. This study aims to provide a comprehensive …

Dynamic linear feedback shift registers: A review

FMA Eljadi, IFT Al Shaikhli - The 5th International Conference …, 2014 - ieeexplore.ieee.org
An improvement in the security of stream cipher is achieved by introducing dynamic
polynomial switching in the Linear Feedback Shift Registers. Several researches declared …

Symmetric algorithms I

FS Masoodi, MU Bokhari - Emerging Security Algorithms and …, 2019 - taylorfrancis.com
This chapter explores basic concepts of symmetric key cryptography. The knowledge of
encryption key is implicitly or explicitly equivalent to knowing the decryption key. These …

[PDF][PDF] Linear Feedback Shift Registers-Based Randomization for Image Steganography

MA Hussein, S Al-Momen - Iraqi Journal of Science, 2023 - iasj.net
Steganography involves concealing information by embedding data within cover media and
it can be categorized into two main domains: spatial and frequency. This paper presents two …

[PDF][PDF] Two level image encryption using pseudo random number generators

V Kapur, ST Paladi, N Dubbakula - International Journal of Computer …, 2015 - academia.edu
The escalating significance of securing data over the network has encouraged development
of secure encryption algorithms. Cryptography is a technique that assists in development of …

New design of efficient non-linear stream key generator

SA Shaker, AG Nasir, FH Ali - AIP Conference Proceedings, 2023 - pubs.aip.org
In this paper we will design a new key generator (KG) depends on the LFSR unit and chaotic
map. The designed KG can be used for many purposes, like cryptography and …

Desain Pembangkit Kunci LFSR dengan Skema A5/1 Menggunakan 7 Blok Bit Fungsi XOR

AJ Herman - 2022 - repository.uksw.edu
Penelitian ini merancang LFSR dengan model skema A5/1 menggunakan 7 fungsi umpan
balik sebagai pembangkit barisan acak. Setiap fungsi umpan balik menggunakan operasi …