To see the other types of publications on this topic, follow the link: Linear Feedback Shift Register (LFSR).

Dissertations / Theses on the topic 'Linear Feedback Shift Register (LFSR)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 15 dissertations / theses for your research on the topic 'Linear Feedback Shift Register (LFSR).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Teo, Sui-Guan. "Analysis of nonlinear sequences and streamciphers." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/63358/1/Sui-Guan_Teo_Thesis.pdf.

Full text
Abstract:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream gener
APA, Harvard, Vancouver, ISO, and other styles
2

Grymel, Martin-Thomas. "Error control with binary cyclic codes." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/error-control-with-binary-cyclic-codes(a5750b4a-e4d6-49a8-915b-3e015387ad36).html.

Full text
Abstract:
Error-control codes provide a mechanism to increase the reliability of digital data being processed, transmitted, or stored under noisy conditions. Cyclic codes constitute an important class of error-control code, offering powerful error detection and correction capabilities. They can easily be generated and verified in hardware, which makes them particularly well suited to the practical use as error detecting codes.A cyclic code is based on a generator polynomial which determines its properties including the specific error detection strength. The optimal choice of polynomial depends on many f
APA, Harvard, Vancouver, ISO, and other styles
3

Dinkelman, Todd. "Chip design for linear feedback shift register test pattern embedding /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1079666581&sid=25&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lowe, Jeffrey. "A high-performance, hybrid wave-pipelined linear feedback shift register with skew tolerant clocks." Online access for everyone, 2004. http://www.dissertations.wsu.edu/Thesis/Summer2004/j%5Flowe%5F072104.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oliver, Gelabert Antoni. "Desarrollo y aceleración hardware de metodologías de descripción y comparación de compuestos orgánicos." Doctoral thesis, Universitat de les Illes Balears, 2018. http://hdl.handle.net/10803/462902.

Full text
Abstract:
Introducción El acelerado ritmo al que se genera y crece la información en la sociedad actual y la posible llegada de la tecnología de transistor a sus límites de tamaño exige la puesta en marcha de soluciones para el procesado eficiente de datos en campos específicos de aplicación. Contenido Esta tesis doctoral de carácter transdisciplinar a medio camino entre la ingeniería electrónica y la química computacional presenta soluciones optimizadas en hardware y en software para la construcción y el procesado eficiente de bases de datos moleculares. En primer lugar se propone y se estudia el
APA, Harvard, Vancouver, ISO, and other styles
6

Simpson, Leonie Ruth. "Divide and conquer attacks on shift register based stream ciphers." Thesis, Queensland University of Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.

Full text
Abstract:
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective
APA, Harvard, Vancouver, ISO, and other styles
8

Penna, Lyta. "Implementation issues in symmetric ciphers." Thesis, Queensland University of Technology, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Fun-Jeng, and 林峯正. "Parallel Architecture Design for Linear Feedback Shift Register(LFSR)." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/81301444095499563091.

Full text
Abstract:
碩士<br>義守大學<br>資訊工程學系<br>90<br>In recent years, cyclic redundancy code (CRC) has been applied widely in storage devices and data communication because of its simple coding structure and keeping the integrity of transmitted data. In traditional way, data in serial performs the CRC computation one bit at a time. It must waste much time according to an increasing number of data. In this paper, we use a simple linear feedback shift register (LFSR) circuit for parallel CRC computation based on the theory of Galois Field and we are absorbed in developing our parallel approach based on lookahead techn
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Pei Lin, and 黃佩琳. "Steganography Using Biometric Images and Linear Feedback Shift Register (LFSR)." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/38818826188942863931.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊系統與應用研究所<br>104<br>Steganography and cryptography are techniques that try to protect message from being captured during data transmission. Algorithms which combined steganography and cryptography can provide a higher security. In this thesis, we propose a least significant bit (LSB) based steganography. In order to enhance the security, we use linear feedback shift register (LFSR) to generate random sequences to do exclusive-or (XOR) operations with the secret message and then embed the ciphered message into biometric images. In the capacity aspect, our algorithm can suppor
APA, Harvard, Vancouver, ISO, and other styles
11

He, Jhen-Hong, and 何鎮宏. "Test Pattern Sequence Generation by Using Bidirectional Linear Feedback Shift Registers ( LFSRs )." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/99295062564455088584.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>102<br>With the progress of IC manufacturing, the number of transistors on the chip is increased. Thereby, the IC designer will spend more time to verify the correctness of chip. There are two main ways for IC testing. The first one is external testing such as Automatic Test Equipments (ATE). It can auto generate the test pattern and have better fault coverage. However, the ATE is very expensive. The second method is Build-In-Self-Test (BIST). Different from ATE, the BIST can accomplish the testing without spending too much hardware overhead. Linear Feedback Shift Regi
APA, Harvard, Vancouver, ISO, and other styles
12

See, Chin-Foo. "Linear feedback shift register, fast compaction algorithms, and their applications." 1990. http://catalog.hathitrust.org/api/volumes/oclc/23661788.html.

Full text
Abstract:
Thesis (M.S.)--University of Wisconsin--Madison, 1990.<br>Typescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 74-76).
APA, Harvard, Vancouver, ISO, and other styles
13

Lin, Jing-Lun, and 林靖倫. "On the Design of Linear Feedback Shift Register Based Encryption Scheme for Industrial Control System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/an2dga.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>107<br>With the rapid growth of Industry 4.0, the manufacturing industries apply cyber-physical systems (CPS) to their industrial control system (ICS) to improve the efficiency of operations, product quality and reduce costs. By the information technology and operational technology of CPS to achieve real-time monitoring, interoperability, and virtualization. However, unless the convenience and benefits of CPS, the characteristics of CPS lead to the isolation between the industrial control system and the external network or system be getting lower and lower, so the vu
APA, Harvard, Vancouver, ISO, and other styles
14

Su, Chien-Ming, and 蘇建銘. "An Iterative Image Encryption Research Based on the Dyadic Displacement and Linear Feedback Shift Register in Discrete Wavelet Domain." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36152869352054755313.

Full text
Abstract:
碩士<br>高苑科技大學<br>電子工程研究所<br>102<br>In recent years, due to explosive development of Internet technology, a great deal of multimedia (images, sounds, videos, etc.) data message is delivering on internet. But in the process how we ensure the security of such information, it has become a problem of concern to the people. At present, image encryption technologies are gaining more and more attentions for researchers. Since the digital images can be transmitted through the Internet, it indirectly generate images safety issues. Image encryption is a way that can ensure the safety of image. However, th
APA, Harvard, Vancouver, ISO, and other styles
15

Bruwer, Christian S. "Correlation attacks on stream ciphers using convolutional codes." Diss., 2005. http://hdl.handle.net/2263/24740.

Full text
Abstract:
This dissertation investigates four methods for attacking stream ciphers that are based on nonlinear combining generators: -- Two exhaustive-search correlation attacks, based on the binary derivative and the Lempel-Ziv complexity measure. -- A fast-correlation attack utilizing the Viterbi algorithm -- A decimation attack, that can be combined with any of the above three attacks. These are ciphertext-only attacks that exploit the correlation that occurs between the ciphertext and an internal linear feedback shift-register (LFSR) of a stream cipher. This leads to a so-called divide and conquer a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!