Search results

Filter

Filetype

Your search for "*" yielded 533663 hits

On LFSR based Stream Ciphers - analysis and design

Popular Abstract in Swedish Den här avhandlingen handlar om kryptering, strömchiffer, metoder för att analysera (knäcka) och konstruera bättre chiffer. Det finns flera olika metoder för att hemliggöra meddelanden. Det klassiska sättet är att två personer som vill kommunicera delar en hemlig nyckel som används för att både kryptera och dekryptera meddelanden. Denna metod kallas symmetrisk krypteriStream ciphers are cryptographic primitives used to ensure privacy in digital communication. In this thesis we focus on stream ciphers built using Linear Feedback Shift Registers (LFSRs). Several different stream ciphers are analysed and new attacks are presented. In addition, two new stream ciphers are presented, both based on the same design. The first attack is performed on SOBER-t16 and SOBER

Ecology of red admiral migration

The red admiral (Vanessa atalanta) is a migratory butterfly that can be found in North America, North Africa, Europe and some parts of Asia. In Europe the main part of the population spend winter in the Mediterranean region and the following spring leave this area to breed further to the north. At least one new generation is then produced in the summer region before they return to the south again

CMOS circuit speed optimization based on switch level simulation

The authors present a tool for transistor sizing for the purpose of speed optimization. The tool, called SLOP (switch-level optimization), is based on a switch-level simulation program for CMOS circuits. Consequently, the results are always verified by simulation. It gives the delay-area curve and the final sizes of each transistor according to the maximum width limitation specified by the user. E

A coarse-grained dynamically reconfigurable architecture for digital signal processing

This paper presents design and implementation of a coarse-grained reconfigurable architecture, targeting digital signal processing applications. The proposed architecture is constructed from a mesh of resource cells, containing the separated processing and memory elements that communicate via a hybrid interconnect network. Parameterizable design of resource cells enables flexible static mapping of

The age of the Kleva intrusion, southeast Sweden

The Kleva nickel-copper mineralization is situated within a gabbro-diorite intrusion on the border between the late Svecofennian rocks of the Oskarshamn-Jonkoping belt and rocks of the slightly younger Transscandinavian Igneous Belt (TIB). The sulphides present in the mafic intrusion are pyrrhotite, chalcopyrite, pentlandite and pyrite, occurring as massive mineralization, disseminations and thin,

Paradiset. Ökenfädernas tänkespråk. Den systematiska samlingen VI : Om fattigdomen och nödvändigheten av att även akta sig för rikedomen

Boken innehåller en grekisk text (baserad på cod. Athos Protaton 86) utgiven av Britt Dahlman och en svensk översättning av den systematiska samlingen av Apophthegmata Patrum (Ökenfädernas tänkespråk), bok 6. Översättningen har gjorts gemensamt av deltagarna i översättningsseminariet vid Johannesakademin.The book contains a Greek text (based on MS Athos Protaton 86) edited by Britt Dahlman and a Swedish translation of the Systematical collection of the Apophthegmata Patrum, book 6. The translation was made jointly by the participants in the translation seminar at Johannesakademin.