Search results

Filter

Filetype

Your search for "*" yielded 530236 hits

GENERAL CLASS OF WINDMILL POLYNOMIALS FOR FAST M-SEQUENCE GENERATION.

Summary form only given. The windmill technique is an attractive alternative to the Lempel-Eastman technique for fast m-sequence generation. The author has generalized the class of linear recurrence relations for which the windmill technique results in an m-sequence generator. A converse to a set of known necessary conditions has been obtained.

Keyed logic BIST for Trojan detection in SoC

As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBI

Incremental authentication of tree-structured documents

A new message authentication code (MAC) is described that exploits the tree structure present in many modern document formats, e.g. SGML and XML. The new code supports incremental updating of the cryptographic checksum in the process of making incremental changes to the document. Theoretical bounds on the probability of a successful substitution attack are derived. Through experimental results we

Fast message authentication using efficient polynomial evaluation

Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexity software polynomial evaluation procedure, that for large message sizes gives a MAC that has about the same low software complexity as for bucket hashing but requires only small keys and has better security characteristics.

Fast authentication codes based on random polynomial residue classes

The verification of the authenticity of a text document or a datafile is one of the main applications of cryptographic techniques. A common used technique for this purpose is the application of a message authentication code (MAC). Usually the MAC computation has to be done in software. Based on the relationship between error-correcting codes and so-called families of almost universal hash function

Estimation of escape probabilities for PPM based on universal source coding theory

Some of the best compression ratios for text compression are provided by the PPM (prediction by partial matching) class of algorithms. These algorithms are based on arithmetic coding using a fixed-depth Markov chain model of the source, i.e., the subsequence of symbols generated in any state s of the source is assumed to be the output of a memoryless subsource w=w(s). One of the most crucial steps

A coding theoretic approach to attack certain stream ciphers

We present a coding theoretic approach to the problem the initial state recovery of a linear feedback shift register when a noisy output sequence is given. Our work is focused on the investigation of the asymptotical behaviour of the recovery process. We give two algorithms which will work for shift registers with arbitrary feedback polynomial. Furthermore, the number of required given noisy symbo

On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2

We present an analysis of some known cartesian authentication codes and their modification into authentication codes with secrecy, with transmission rate R = r/n, where n = 2, 3, …, and 1 ≤ r ≤ n - 1 using (n - r)(r + 1) q-ary key digits. For this purpose we use a grouping technique. Essentially the same key grouping technique is used for the construction of codes that withstand spoofing attacks o

Stroboscopic operando spectroscopy of the dynamics in heterogeneous catalysis by event-averaging

Heterogeneous catalyst surfaces are dynamic entities that respond rapidly to changes in their local gas environment, and the dynamics of the response is a decisive factor for the catalysts’ action and activity. Few probes are able to map catalyst structure and local gas environment simultaneously under reaction conditions at the timescales of the dynamic changes. Here we use the CO oxidation react

Self-selective formation of ordered 1D and 2D GaBi structures on wurtzite GaAs nanowire surfaces

Scaling down material synthesis to crystalline structures only few atoms in size and precisely positioned in device configurations remains highly challenging, but is crucial for new applications e.g., in quantum computing. We propose to use the sidewall facets of larger III–V semiconductor nanowires (NWs), with controllable axial stacking of different crystal phases, as templates for site-selectiv

Complex attosecond waveform synthesis at fel fermi

Free-electron lasers (FELs) can produce radiation in the short wavelength range extending from the extreme ultraviolet (XUV) to the X-rays with a few to a few tens of femtoseconds pulse duration. These facilities have enabled significant breakthroughs in the field of atomic, molecular, and optical physics, implementing different schemes based on two-color photoionization mechanisms. In this articl

Conflict in Colours : A comparative study of republican and loyalist murals in Belfast

”Conflict in Colours” är en avhandling som fokuserar på historiska narrativs roll i att legitimera och bibehålla konflikter, samt hur dessa narrativ påverkar den begynnande fredsprocessen. Genom att studera det inneboende kulturella våldet i dessa narrativ har jag visat hur kulturellt våld är en essentiell del i att legitimera, påverka och bibehålla det antagonistiska förhållandet mellan parterna Conflict in Colours is a book about the role of cultural violence in maintaining and transferring conflict situations by investigating republican and loyalist murals in Belfast during the Troubles and the Northern Irish peace process. During several decades, the people of Northern Ireland have endured warlike situations before the peace agreement in 1998. This doctoral thesis examines the ways/how

Multiple scattering by a collection of randomly located obstacles Part IV: The effect of the pair correlation function

The effect of two different pair correlation functions, used to model multiple scattering in a slab filled with randomly located spherical particles, is investigated. Specifically, the Percus-Yevick approximation is employed and a comparison with the simple hole correction is made. The kernel entries of the hole correction have an analytic solution, which makes the numerical solution of the integr