The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated by the linear feedback shift register, which means the generated sequence can't meet satisfy the unpredictable demand for secure paradigm. Tent chaotic equation combined with the linear property of Linear Feedback Shift Register (LFSR) has resulted in a novel arbitrary sequence generator having a lengthier and composite structure. An analysis of the LFSR output sequence's architecture when combined with Tent map has revealed similar conformity compared to the homologous set of the individual linear constituents. Furthermore to ensure the reliability of using the proposed Pseudo Random Number Generator (PRNG) in secure algorithms, the generat...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
International audienceSecurity of information transmitted through the Internet, against passive or a...
Linear Feedback Shift Registers (LFSR) play a vital role to provide cybersecurity for the data commu...
The random sequence generated by linear feedback shift register can’t meet the demand of unpredictab...
The information transmission domain had well been extended by the recent and fast developments in th...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptography is widely used by everybody in day-to-day activities. Many cryptographic algorithms re...
True random numbers have gained wide applications in many areas like: com- puter simulation, Mo...
A pseudorandom sequence is a repeatable sequence with random statistical properties that is widely u...
Many of the key stream generators which are used in practice are LFSR-based in the sense that they p...
We investigate a cryptographically secure pseudorandom number generator based on a Linear Feedback S...
International audienceFor both chaos-based stream ciphers and chaos-based block ciphers, ke...
Pseudo Random binary Sequence Generator technique are used for various cryptographic applications an...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
International audienceSecurity of information transmitted through the Internet, against passive or a...
Linear Feedback Shift Registers (LFSR) play a vital role to provide cybersecurity for the data commu...
The random sequence generated by linear feedback shift register can’t meet the demand of unpredictab...
The information transmission domain had well been extended by the recent and fast developments in th...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptology is the study and application of encrypting and decrypting data so that only the intended ...
Cryptography is widely used by everybody in day-to-day activities. Many cryptographic algorithms re...
True random numbers have gained wide applications in many areas like: com- puter simulation, Mo...
A pseudorandom sequence is a repeatable sequence with random statistical properties that is widely u...
Many of the key stream generators which are used in practice are LFSR-based in the sense that they p...
We investigate a cryptographically secure pseudorandom number generator based on a Linear Feedback S...
International audienceFor both chaos-based stream ciphers and chaos-based block ciphers, ke...
Pseudo Random binary Sequence Generator technique are used for various cryptographic applications an...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
International audienceSecurity of information transmitted through the Internet, against passive or a...
Linear Feedback Shift Registers (LFSR) play a vital role to provide cybersecurity for the data commu...