1,625 Hits in 3.1 sec

sin[n Delta t sin (n Delta t1)] as a source of unpredictable dynamics [article]

Stefano Morosetti
2014 arXiv   pre-print
Moreover, the function acossin[n Delta t sin (n Delta t1)]/pigreek is introduced to have an uniform density of numbers in the interval [0,1], so it can be submitted to a battery of widely used tests for  ...  random number generators.  ...  Tests for random number generators A library of tests for random number generators is available at the address by the Center for Information Security and Cryptography  ... 
arXiv:1103.3160v2 fatcat:oeh7lsyctnd7dkgbb6mzmmoubq

Chaotic Encryption Based Data Transmission Using Delta and Delta-Sigma Modulators

Günyaz Ablay
2016 International Journal of Applied Mathematics Electronics and Computers  
In this work, a chaotic random bit generator based approach for encrypting digital data of the delta and delta-sigma modulators is studied.  ...  Delta and Delta-Sigma modulation methods have been getting a great interest recently due to the great progress in analogdigital very large scale integration technology.  ...  The Δ modulation systems, a type of variable structure control, are also getting a special interest in the control community [6] - [10] .  ... 
doi:10.18100/ijamec.280466 fatcat:6q5eupiodfccteuxhq3ryz3mym

Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker [article]

Serge Fehr, Christian Schaffner
2007 arXiv   pre-print
Randomness extraction is of fundamental importance for information-theoretic cryptography.  ...  Randomness extraction is done by XOR'ing a so-called delta-biased mask to the raw key. Our result allows to extend the classical applications of this extractor to the quantum setting.  ...  In the context of cryptography, the latter kind of randomness extraction is also known as privacy amplification [5] .  ... 
arXiv:0706.2606v2 fatcat:4pttc7vvrvhc7nexgowqmonhoq

A precision measurement of the muon decay parameter delta [article]

Andrei Gaponenko
2011 arXiv   pre-print
Improved limits on the product of another muon decay parameter, xi, and the muon polarization in pion decay, Pmu, are obtained in the form: 0.9960<Pmu*xi<=xi<1.0040, at 90% confidence level.  ...  The obtained value, delta=0.74964+-0.00066(stat.)+-0.00112(syst.), is consistent with the Standard Model expectation delta=3/4.  ...  Also, a track is reconstructed in the two halves of the detector, so random fitting errors contribute twice.  ... 
arXiv:1104.2914v1 fatcat:esm7wwmxlrfthmansdmsg5x4cy

Implementation of Hardware Encryption Engine for Wireless Communication on a Reconfigurable Instruction Cell Architecture

Zong Wang, Tughural Arslan, Ahmet Erdogan
2008 4th IEEE International Symposium on Electronic Design, Test and Applications (delta 2008)  
Security issues emerged in recent years as the fast development of wireless technology, especially for mobile devices where computing resources are sparse.  ...  This paper presents the implementation of RC4 as well as AES (Advanced Encryption Standard) cipher algorithm, which are widely used in IEEE 802.11 as well as IEEE 802.16 and other standards.  ...  In cryptography, RC4 algorithm is the most widely-used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP.  ... 
doi:10.1109/delta.2008.100 dblp:conf/delta/WangAE08 fatcat:ykxr77ph4zevbltzm4m4bmggti

Recent Trends in FPGA Architectures and Applications

Philip H. W. Leong
2008 4th IEEE International Symposium on Electronic Design, Test and Applications (delta 2008)  
In this paper, some recent developments in FPGA devices, platforms and applications are reviewed, with a focus on high performance applications of this technology. 4th IEEE International Symposium on Electronic  ...  Since modern FPGAs can meet many of the performance requirements of ASICs, they are being increasingly used in their place.  ...  ; random number generation and logic emulation.  ... 
doi:10.1109/delta.2008.14 dblp:conf/delta/Leong08 fatcat:vzvkw2arendslj4yk5wg64tzre

Comprehensive analysis of a three‐phase DC–DC resonant converter with an open delta‐wye transformer using variable frequency

Kristian Pessoa dos Santos, Paulo Peixoto Praça, Hermínio Miguel Oliveira Filho, Demercil de Souza Oliveira, Luís Henrique Silva Colado Barreto, Gustavo Alves de Lima Henn
2020 Electronics Letters  
This study reports attempts to characterise the noise properties of ungelled, textile-based electrodes intended for use in ECG recording in wearable garments.  ...  These experimental results showed that the proposed model is effective in terms of clustering performance and has robustness against the error that occurs from homomorphic evaluation and approximate operations  ...  In this work, a three-phase soft-switched DC-DC resonant converter with an open delta-wye highfrequency transformer using variable frequency is proposed.  ... 
doi:10.1049/ell2.12043 fatcat:ihtryqe5vjg3bivdzdjd5heypy

A Study on Combining EEG Signals and Crytography for Bitcoin Security

Dang Nguyen, Dat Tran, Wanli Ma
2019 Australian Journal of Intelligent Information Processing Systems  
by the National Institute of Standard and Technology (NIST) for examining the quality of randomness, especially in cryptography applications.  ...  In this paper, we propose two EEG-based systems including cryptographic key generation and (true) random number generation to enhance Bitcoin security.  ...  In Bitcoin, the keys are stored in a file or a database called a wallet. A random number and its generation are essential parts of cryptography.  ... 
dblp:journals/ajiips/NguyenTM19 fatcat:55g5sk6dpnh7na4zm6piiof4xq

Introducing secure modes of operation for optical encryption

Thomas J. Naughton, Bryan M. Hennelly, Tom Dowling
2008 Optical Society of America. Journal A: Optics, Image Science, and Vision  
We analyze optical encryption systems using the techniques of conventional cryptography.  ...  We consider all attacks proposed to date in one particular scenario.  ...  In [1] an optical encryption scheme is proposed called "double random phase encoding" (DRPE), which involves multiplying by two random phases in the input plane and in the Fourier domain.  ... 
doi:10.1364/josaa.25.002608 pmid:18830339 fatcat:x4w6c7bjrnb3pmocp2le4fh5bu

VLSI Implementation of Hybrid Cryptography Algorithm Using LFSR Key

Shailaja Acholli, Visvesvaraya Technological University, Krishnamurthy Ningappa, Bhageerathi Bai Narayana Rao Maanay Institute of Technology
2019 International Journal of Intelligent Engineering and Systems  
A large key size ensures the randomness, but proportionally maximizes the network load with high complexity.  ...  In this research, hybrid cryptographic algorithm -Extended Tiny Encryption Algorithm (XTEA) combined with International Data Encryption Algorithm (IDEA) was implemented for improving the security in real-time  ...  Here, 𝑋 is independent variable, 𝑌 is dependent variable, 𝑛 is number of data points in the samples, 𝑋 ̅ is mean of the independent variable𝑋, 𝑌 ̅ is mean of the independent variable 𝑌.  ... 
doi:10.22266/ijies2019.0831.02 fatcat:n5b7xdqlzrdmdhwyp26hjfjhn4

A New Hyperchaotic Map for a Secure Communication Scheme with an Experimental Realization

Nadia M. G. Al-Saidi, Dhurgham Younus, Hayder Natiq, M. R. K. Ariffin, M. A. Asbullah, Z. Mahad
2020 Symmetry  
Using different chaotic systems in secure communication, nonlinear control, and many other applications has revealed that these systems have several drawbacks in different aspects.  ...  In this paper, we introduce a new 2D chaotic map, namely, the 2D infinite-collapse-Sine model (2D-ICSM).  ...  Meanwhile, the 1D Sine map is employed to boost randomness to the state variable x n+1 .  ... 
doi:10.3390/sym12111881 fatcat:34puitmhcjegxi45dnda7mkepq

Cryptography Based On Neural Network

Eva Volna, Martin Kotyrba, Vaclav Kocian, Michal Janosek
2012 ECMS 2012 Proceedings edited by: K. G. Troitzsch, M. Moehring, U. Lotzmann  
This paper deals with using neural network in cryptography, e.g. designing such neural network that would be practically used in the area of cryptography.  ...  The neural net application represents a way of the next development in good cryptography.  ...  Neural networks offer a very powerful and general framework for representing non-linear mapping from several input variables to several output variables.  ... 
doi:10.7148/2012-0386-0391 dblp:conf/ecms/VolnaKKJ12 fatcat:24t4mw5s5ramfn36icgl4q6i5e

A Fast Searching Algorithm of Symmetrical Period Modulation Pattern Based on Accumulative Transformation Technique [chapter]

FuHua Fan, Ying Tan
2005 Lecture Notes in Computer Science  
role of cryptography in network security.  ...  NETWORK SECURITY AND CRYPTOGRAPHY Unit -I: Introduction Attacks, services and mechanisms, security attacks, security services, a model for internet work security, protection through cryptography, the  ...  Probability, Random Variables and Stochastic processes -by A.Papulis(TMH) 2. Probability, Random Variables and Stochastic processes -by Peebles  ... 
doi:10.1007/11539117_71 fatcat:7rghuykmvrhkdnl4fblp2zi3fu

The M2DC Project: Modular Microserver DataCentre

Mariano Cecowski, Giovanni Agosta, Ariel Oleksiak, Michal Kierzynka, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, Rene Griessl, Meysam Peykanu, Lennart Tigges (+13 others)
2016 2016 Euromicro Conference on Digital System Design (DSD)  
Since their introduction, FPGAs can be seen in more and more different fields of applications.  ...  This paper provides an overview of the different topics FPGAs have been used for in the last 15 years of research and why they have been chosen over other processing units like e.g. CPUs.  ...  Improvement in AES cipher text randomization 2002 [129] Cryptography Ombinatorial multiplier over canonical base GF(16) 2002 [130] Image processing 3D vision for moblie robot positioning 2002  ... 
doi:10.1109/dsd.2016.76 dblp:conf/dsd/CecowskiAOKBCKP16 fatcat:bu4nbkqaejebjafrotibui6mkq

Random Number Generators Basedon EEG Non-linear and ChaoticCharacteristics

Dang Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma
2018 Journal of Cyber Security and Mobility  
the quality of random number generators, especially in cryptography application.  ...  In this paper, we propose a new method that explores the use of these EEG characteristics in generating random numbers.  ...  R E T R A C T E D • Delta waves: Delta wave frequency lies between 0.5 and 3 Hz, with variable amplitude [24] .  ... 
doi:10.13052/jcsm2245-1439.634 fatcat:c5nj6fs64jcxbg2i5b26qzhpp4
« Previous Showing results 1 — 15 out of 1,625 results