Dissertations / Theses on the topic 'Linear feedback shift registers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Linear feedback shift registers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ullah, Shafqat. "Algorithm for Non-Linear Feedback Shift Registers Delay Optimization." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-62815.
Full textVenkataraman, Srikanth. "Built-in self test based on reseeding of linear feedback shift registers." Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=69705.
Full textTwo methods for processing a test set to allow for efficient encoding of testcubes as LFSR seeds are proposed. The first method involves merging pairwise consistent testcubes in the test set. The second method involves concatenating the original testcubes to form longer testcubes. This allows multiple testcubes to be encoded into a single LFSR seed. Algorithms to perform merging and concatenation of the test set are presented. An algorithm for calculating LFSR seeds from the test set is described. A method to balance testcubes with respect to the feedback polynomials of the multiple polynomial LFSR is proposed. This allows the encoding of feedback polynomials to be done implicitly by the ordering of testcubes. An algorithm for the selection and ordering of feedback polynomials is presented.
Experimental results are provided for the ISCAS-85 and ISCAS-89 benchmark circuits to demonstrate the effectiveness of the scheme. The scheme allows an excellent trade-off between test data storage and test application time (number of test patterns) with a very small hardware overhead. We show the trade-off between test data storage and number of test patterns under the scheme.
Dinkelman, Todd. "Chip design for linear feedback shift register test pattern embedding /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1079666581&sid=25&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textAl, Hinai Sultan Zayid Mohammed. "Algebraic attacks on clock-controlled stream ciphers." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/37243/1/Sultan_Al-Hinai_Thesis.pdf.
Full textLowe, Jeffrey. "A high-performance, hybrid wave-pipelined linear feedback shift register with skew tolerant clocks." Online access for everyone, 2004. http://www.dissertations.wsu.edu/Thesis/Summer2004/j%5Flowe%5F072104.pdf.
Full textSimpson, Leonie Ruth. "Divide and conquer attacks on shift register based stream ciphers." Thesis, Queensland University of Technology, 2000.
Find full textRaaphorst, Sebastian. "Variable Strength Covering Arrays." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23684.
Full textTeo, Sui-Guan. "Analysis of nonlinear sequences and streamciphers." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/63358/1/Sui-Guan_Teo_Thesis.pdf.
Full textGrymel, Martin-Thomas. "Error control with binary cyclic codes." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/error-control-with-binary-cyclic-codes(a5750b4a-e4d6-49a8-915b-3e015387ad36).html.
Full textXiaoyu, Dang, Zhang Yong, and Zhou Tingxian. "A METHOD TO ENHANCE THE BIT RATE OF LINEAR CODE GENERATOR IN SPREAD-SPECTRUM COMMUNICATION SYSTEM." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/607337.
Full textBecause of the limits of feedback devices, high-speed pseudo-noise code generators cannot depend simply on the improvement of clock rate. Based on the characteristic equation of linear feedback registers and the m-sequence sampling theory as well, deduction is made to indicate a novel way to improve the speed of pseudo-noise code generators 2^l (2^l < n, n is the length of registers) times as fast as the conventional one. Also, we extend our applications to non-reducible and non-primitive polynomials. It could be a good way to generate these linear codes at higher rates.
Penna, Lyta. "Implementation issues in symmetric ciphers." Thesis, Queensland University of Technology, 2002.
Find full textShramchenko, B. L. "Properties of encoding flow keys." Thesis, Київський національний університет технологій та дизайну, 2020. https://er.knutd.edu.ua/handle/123456789/16476.
Full textOliver, Gelabert Antoni. "Desarrollo y aceleración hardware de metodologías de descripción y comparación de compuestos orgánicos." Doctoral thesis, Universitat de les Illes Balears, 2018. http://hdl.handle.net/10803/462902.
Full textIntroducció El creixement accelerat de les dades en la societat actual i l'arribada de la tecnologia del transistor als límits físics exigeix la proposta de metodologies per al processament eficient de dades. Contingut Aquesta tesi doctoral, de caràcter transdisciplinària i a mig camí entre els camps de l'enginyeria electrònica i la química computacional presenta solucions optimitzades en maquinari i en programari per tal d’accelerar el processament de bases de dades moleculars. En primer lloc es proposa i s'estudia el funcionament de blocs digitals que implementen funcions de lògica polsant estocàstica aplicades a tasques de reconeixement d'objectes. En concret es proposen i analitzen dissenys específics per a la construcció de generadors de nombres aleatoris (RNG) com a sistemes bàsics per al funcionament dels sistemes de computació estocàstics implementats en dispositius programables com les Field Programable Gate Array (FPGA). En segon lloc es proposen i avaluen un conjunt reduït de descriptors moleculars especialment orientats a la caracterització de compostos orgànics. Aquests descriptors reuneixen la informació sobre la distribució de càrrega molecular i les energies electroestàtiques. Les bases de dades generades amb aquests descriptors s’han processat emprant sistemes de computació convencionals en programari i mitjançant sistemes basats en computació estocàstica implementats en maquinari programable. Finalment es proposen optimitzacions per al càlcul del potencial electroestàtic molecular (MEP) calculat mitjançant la teoria del funcional de la densitat (DFT) i dels punts d’interacció que se’n deriven (SSIP). Conclusions Per una banda, els resultats obtinguts posen de manifest la importància de la uniformitat del RNG en el període d’avaluació per a poder implementar sistemes de computació estocàstics d’alta fiabilitat. A més, els RNG proposats presenten una font d’aleatorietat aperiòdica que minimitza les correlacions entre senyals, fent-los adequats per a la implementació de sistemes de computació estocàstica. Per una altra banda, el conjunt de descriptors moleculars proposats PED, han demostrat obtenir molts bons resultats en comparació amb els mètodes presents a la literatura. Aquest fet ha estat discutit mitjançant l’anàlisi dels paràmetres Area Under The Curve (AUC) i Enrichment Factor (EF) de les curves Receiving Operating Characteristic (ROC) analitzades. A més, s’ha mostrat com l’eficàcia dels descriptors augmenta de manera significativa quan s’implementen en sistemes de classificació amb aprenentatge supervisat com les finestres de Parzen, fent-los adequats per a la construcció d’un sistema de predicció de dianes terapèutiques eficient. En aquesta tesi doctoral, a més, s’ha trobat que els MEP calculats mitjançant la teoria DFT i el conjunt de bases B3LYP/6-31*G en la superfície amb densitat electrònica 0,01 au correlacionen bé amb dades experimentals possiblement a causa de la contribució més gran de les propietats electroestàtiques locals reflectides en el MEP. Les parametritzacions proposades en funció del tipus d’hibridació atòmica han contribuït també a la millora dels resultats. Els càlculs realitzats en aquestes superfícies suposen un guany en un factor cinc en la velocitat de processament del MEP. Donat l’acceptable ajust a les dades experimentals del mètode proposat per al càlcul del MEP aproximat i dels SSIP que se’n deriven, aquest procediment es pot emprar per obtenir els SSIP en bases de dades moleculars extenses i en macromolècules (com ara proteïnes) d’una manera molt ràpida (ja que la velocitat de processament obtinguda arriba fins als cinc mil àtoms per segon amb un sol processador). Les tècniques proposades en aquesta tesi doctoral resulten d’interès donades les nombroses aplicacions que tenen els SSIP com per exemple, en el cribratge virtual de cocristalls o en la predicció d’energies lliures en dissolució.
Introduction Because of the generalized data growth in the nowadays digital era and due to the fact that we are possibly living on the last days of the Moore’s law, there exists a good reason for being focused on the development of technical solutions for efficient data processing. Contents In this transdisciplinary thesis between electronic engineering and computational chemistry, it's shown optimal solutions in hardware and software for molecular database processing. On the first hand, there's proposed and studied a set of stochastic computing systems in order to implement ultrafast pattern recognition applications. Specially, it’s proposed and analyzed specific digital designs in order to create digital Random Number Generators (RNG) as a base for stochastic functions. The digital platform used to generate the results is a Field Programmable Gate Array (FPGA). On the second hand, there's proposed and evaluated a set of molecular descriptors in order to create a compact molecular database. The proposed descriptors gather charge and molecular geometry information and they have been used as a database both in software conventional computing and in hardware stochastic computing. Finally, there's a proposed a set of optimizations for Molecular Electrostatic Potential (MEP) and Surface Site Interaction Points (SSIP). Conclusions Firstly, the results show the relevance of the uniformity of the RNG within the evaluation period in order to implement high precision stochastic computing systems. In addition, the proposed RNG have an aperiodic behavior which avoid some potential correlations between stochastic signals. This property makes the proposed RNG suitable for implementation of stochastic computing systems. Secondly, the proposed molecular descriptors PED have demonstrated to provide good results in comparison with other methods that are present in the literature. This has been discussed by the use of Area Under the Curve (AUC) and Enrichment Factor (EF) of averaged Receiving Operating Characteristic (ROC) curves. Furthermore, the performance of the proposed descriptors gets increased when they are implemented in supervised machine learning algorithms making them appropriate for therapeutic target predictions. Thirdly, the efficient molecular database characterization and the usage of stochastic computing circuitry can be used together in order to implement ultrafast information processing systems. On the other hand, in this thesis, it has been found that the MEP calculated by using DFT and B3LYP/6-31*G basis at 0.01 au density surface level has good correlation with experimental data. This fact may be due to the important contribution of local electrostatics and the refinement performed by the parameterization of the MEP as a function of the orbital atom type. Additionally, the proposed calculation over 0.01 au is five times faster than the calculation over 0.002 au. Finally, due to acceptable agreement between experimental data and theoretical results obtained by using the proposed calculation for MEP and SSIP, the proposed method is suitable for being applied in order to quickly process big molecular databases and macromolecules (the processing speed can achieve five thousand molecules per second using a single processor). The proposed techniques have special interest with the purpose of finding the SSIP because the big number of applications they have as for instance in virtual cocrystal screening and calculation of free energies in solution.
Bayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.
Full textFu, Ying-Ping, and 傅穎平. "A Study on Linear Feedback Shift Registers with Nonlinear Feedforward Logic." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/95681396143795870590.
Full text國立交通大學
資訊工程系
87
The theory of the stream cipher has developed quickly these years. The most important part of the architecture of the stream cipher is the Running Key Generator(RKG). For security reasons, the key stream generated by the RKG should satisfy a few demands such as long period, high linear complexity, good randomness, etc. The primary objective of this thesis is to study the RKG which is based on the Linear Feedback Shift Register(LFSR). We adopt a conventional method to construct the maximal-length LFSR which can generate the sequence with very long period. But these sequences do not have high linear complexity. To overcome the drawback, we give another model which is based on the LFSR with nonlinear feedforward logic. By this model, we can promote the linear complexity of the output sequences easily. Moreover, we also introduce some methods to test the randomness of any sequence.
Ming-Tsai, Su, and 蘇明財. "Testing of the NAND Flash Memory with Linear Feedback Shift Registers." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/26275069306014981724.
Full text東海大學
數學系
95
The main purpose of this thesis is to research the tests of the reduced functional faults of the consuming electronic product: NAND flash memory. The linear congruential method and linear feedback shift registers (LFSR) are used to product random numbers that locate the page address for testing the reduced functional faults of the NAND flash memory. The purpose of this study is to develop a software testing environment to drive a low cost hardware device in identifying the page with reduced functional faults for NAND flash memory. The test result shows that LFSR has better performance than the others.
He, Jhen-Hong, and 何鎮宏. "Test Pattern Sequence Generation by Using Bidirectional Linear Feedback Shift Registers ( LFSRs )." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/99295062564455088584.
Full text中原大學
資訊工程研究所
102
With the progress of IC manufacturing, the number of transistors on the chip is increased. Thereby, the IC designer will spend more time to verify the correctness of chip. There are two main ways for IC testing. The first one is external testing such as Automatic Test Equipments (ATE). It can auto generate the test pattern and have better fault coverage. However, the ATE is very expensive. The second method is Build-In-Self-Test (BIST). Different from ATE, the BIST can accomplish the testing without spending too much hardware overhead. Linear Feedback Shift Registers (LFSR) is widely adopted as the pseudo-random test pattern generator for BIST, due to its low hardware overhead. However, there are many faults are hardly detected by the traditional LFSR. To achieve the better fault coverage and testing cycle, we want to propose a new test pattern generation LFSR architecture by using bidirectional shifter register. By analyzing target test vectors, we can systematically design a test pattern generator which has better fault coverage and shortest generation sequence. Because each shifting only cost one bit change, we can also reduce the power consumption. Our benchmark is provided by CAD96 [12]. By comparing the difference between one-way and two-way test pattern generator, we can observe that the generation sequence length of two-way test pattern generator is shorter than one way. Although the two-way test pattern generator expenses more gates to design the circuit, we can come to better testing time.
Lin, Chan-Yu, and 林展裕. "Using Selective Mapping with Linear Feedback Shift Registers for PAPR Reduction of OFDM Systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/96138934548776461168.
Full text國立高雄第一科技大學
電腦與通訊工程所
92
In wireless system, and time of technology, the system is required faster speed rate of transmission. Orthogonal frequency division multiplexing is a kind of multi-carrier modulation system. It is good for high data rate in orthogonal frequency channel, and it is effective to reduce multi-path fading on wireless channel. However, there is a main drawback in OFDM system, where the signal is higher PAPR. The amplifier needs larger linear range in order to avoid producing non-linear distortion which leads to increase bit error rate and spread outside band, but it will enlarge linear range of operation, and waste the efficiency of amplifier. Therefore, in this thesis, we want to solve the PAPR problem in OFDM system. First we discuss the method of signal clipping to reduce high PAPR value, and then it causes a serious distortion in output signals. In order to avoid serious distortion for PAPR problem, we use random sequence to produce new sequence to change the original sequence. Then we choose sequence of the smallest PAPR value to transmit, and also construct encoder and insert labels to provide recognition. Therefore, we can know which sequence was transmitted in the receiver. Finally, we can not only reduce the PAPR value, but also reduce bit error rate. All outcomes will be introduced in this thesis.
Lin, Fun-Jeng, and 林峯正. "Parallel Architecture Design for Linear Feedback Shift Register(LFSR)." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/81301444095499563091.
Full text義守大學
資訊工程學系
90
In recent years, cyclic redundancy code (CRC) has been applied widely in storage devices and data communication because of its simple coding structure and keeping the integrity of transmitted data. In traditional way, data in serial performs the CRC computation one bit at a time. It must waste much time according to an increasing number of data. In this paper, we use a simple linear feedback shift register (LFSR) circuit for parallel CRC computation based on the theory of Galois Field and we are absorbed in developing our parallel approach based on lookahead technique for the other LFSR applications.
Huang, Pei Lin, and 黃佩琳. "Steganography Using Biometric Images and Linear Feedback Shift Register (LFSR)." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/38818826188942863931.
Full text國立清華大學
資訊系統與應用研究所
104
Steganography and cryptography are techniques that try to protect message from being captured during data transmission. Algorithms which combined steganography and cryptography can provide a higher security. In this thesis, we propose a least significant bit (LSB) based steganography. In order to enhance the security, we use linear feedback shift register (LFSR) to generate random sequences to do exclusive-or (XOR) operations with the secret message and then embed the ciphered message into biometric images. In the capacity aspect, our algorithm can support up to four least significant bits (4LSB) replacement according to the size of message. The effectiveness of the proposed method is estimated by peak signal-to-noise ratio (PSNR), embedding rate and execution time. The results show that high PSNR values with short execution time is feasible.
See, Chin-Foo. "Linear feedback shift register, fast compaction algorithms, and their applications." 1990. http://catalog.hathitrust.org/api/volumes/oclc/23661788.html.
Full textTypescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 74-76).
Lin, Jing-Lun, and 林靖倫. "On the Design of Linear Feedback Shift Register Based Encryption Scheme for Industrial Control System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/an2dga.
Full text國立臺灣科技大學
資訊管理系
107
With the rapid growth of Industry 4.0, the manufacturing industries apply cyber-physical systems (CPS) to their industrial control system (ICS) to improve the efficiency of operations, product quality and reduce costs. By the information technology and operational technology of CPS to achieve real-time monitoring, interoperability, and virtualization. However, unless the convenience and benefits of CPS, the characteristics of CPS lead to the isolation between the industrial control system and the external network or system be getting lower and lower, so the vulnerabilities and attacks are rising rapidly. Therefore, we propose a symmetric encryption scheme based on a linear feedback shift register to encrypt each data by dynamically generating the symmetric key to protect the internal data transmission of the industrial control system. Through the simulation result, the proposed encryption scheme could encrypt 2MB per second approximately so it is capable to execute on device and equipment of industrial control systems. Furthermore, we do the security analysis against the proposed encryption scheme, it could prevent hacker eavesdropping and man-in-the-middle attacks.
Su, Chien-Ming, and 蘇建銘. "An Iterative Image Encryption Research Based on the Dyadic Displacement and Linear Feedback Shift Register in Discrete Wavelet Domain." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36152869352054755313.
Full text高苑科技大學
電子工程研究所
102
In recent years, due to explosive development of Internet technology, a great deal of multimedia (images, sounds, videos, etc.) data message is delivering on internet. But in the process how we ensure the security of such information, it has become a problem of concern to the people. At present, image encryption technologies are gaining more and more attentions for researchers. Since the digital images can be transmitted through the Internet, it indirectly generate images safety issues. Image encryption is a way that can ensure the safety of image. However, the traditional encryption methods cannot satisfy image due to big quantity. According to the characteristic of image, researchers produce a variety of image encryption methods. A novel iterative image encryption scheme using the image dyadic displacement, the linear feedback shift registers and discrete wavelet transform in the cascading way is proposed to defeat the disadvantages of the conventional image encryption. Multi-keys are used in the proposed scheme to promote the security level of the image encryption. Furthermore, the results of the simulations show that the decrypted image is a picture filled with noises and hardly to be identified if any key used in the decryption process is wrong.
Bruwer, Christian S. "Correlation attacks on stream ciphers using convolutional codes." Diss., 2005. http://hdl.handle.net/2263/24740.
Full textDissertation (MEng (Electronic Engineering))--University of Pretoria, 2007.
Electrical, Electronic and Computer Engineering
unrestricted