|
|
|
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche...
ver más
|
|
|
|
|
|
|
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar...
ver más
|
|
|
|
|
|
|
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw...
ver más
|
|
|
|
|
|
|
Kiernan George and Alan J. Michaels
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
ver más
|
|
|
|
|
|
|
Nagendar Yerukala,V Kamakshi Prasad,Allam Apparao
Pág. 11 - 18
For a stream cipher to be secure, the keystreamgenerated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certainprobability distribution. In this paper, we perform a detailedstatistical anal...
ver más
|
|
|
|