• No results found

[PDF] Top 20 A Quasigroup Based Random Number Generator for Resource Constrained Environments

Has 10000 "A Quasigroup Based Random Number Generator for Resource Constrained Environments" found on our website. Below are the top 20 most common "A Quasigroup Based Random Number Generator for Resource Constrained Environments".

A  Quasigroup  Based  Random  Number  Generator  for  Resource  Constrained  Environments

A Quasigroup Based Random Number Generator for Resource Constrained Environments

... Gligoroski and Markovski explore the use of quasigroups for pseudo random number generation [16]. Markovski and Dimitrova looked at applying multiple QG stream cipher passes on an initial vector of a single ... See full document

5

Design and Analysis of a Random Number Generator on FPGA

Design and Analysis of a Random Number Generator on FPGA

... Uniform Random Number Generators for FPGA Architectures ‖ ...good resource–quality balance compared to previous FPGA-optimized generators, between the previous high-resource high-period ... See full document

10

Breaking  Another  Quasigroup-Based  Cryptographic  Scheme

Breaking Another Quasigroup-Based Cryptographic Scheme

... pseudo random number generators. Since in most tests the number of rejections for their pseudo random number generator was lower than for the competitors, they conclude that ... See full document

8

Non-Recurring Improved Random Number Generator- a new step to improve cryptographic algorithms

Non-Recurring Improved Random Number Generator- a new step to improve cryptographic algorithms

... true random number generator generates series of numbers that are unpredictable, independent and ...true random number generator to generate a perfectly random series ... See full document

6

A NEW CHAOTIC ATTRACTOR FOR RANDOM NUMBER GENERATION BASED ON MEMRISTIVE CIRCUIT

A NEW CHAOTIC ATTRACTOR FOR RANDOM NUMBER GENERATION BASED ON MEMRISTIVE CIRCUIT

... the number array according to a hypothesis for randomness, starting from the ratios of increases and decreases in the number sequence ...the number sequence is random according to this ... See full document

10

VMPC-R  Cryptographically  Secure  Pseudo-Random  Number  Generator  Alternative  to  RC4

VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4

... We presented a new Cryptographically Secure Pseudo-Random Number Generator, VMPC-R. We devised a universal statistical test which we used to probe over 250 candidates before we found an algorithm ... See full document

15

A new method for generating key for cryptography using Deterministic random number generator

A new method for generating key for cryptography using Deterministic random number generator

... In cryptography there are so many encryption systems are there. They are substitutions ciphers, transposition ciphers, mono alphabetic ciphers, poly alphabetic ciphers, modular mathematics and one-time pad etc. Whatever ... See full document

6

Resource Observation in WSN-based Constrained Networks

Resource Observation in WSN-based Constrained Networks

... large number of machines will interact with each other without the need for human intervention, we begin to realize that we need a standard way to enable communication between these ...called Constrained ... See full document

5

Analysing partner selection through exchange values

Analysing partner selection through exchange values

... In an effort to experiment with these models, we have adopted the context of a dy- namic collaborative research environment (as in Bioinformatics), in which researchers exchange information and tools in order to complete ... See full document

17

Planning with Tradable Reservations in Mobile Assistants operating in Resource Constrained Environments

Planning with Tradable Reservations in Mobile Assistants operating in Resource Constrained Environments

... As social beings, we spend time performing activities in multi-user environments that have limited capacity to serve users, like restaurants, malls and grocery stores. The quality of our experience depends not ... See full document

77

Analysing partner selection through exchange values

Analysing partner selection through exchange values

... values, based on Piaget’s theory ...is based on Piaget’s ...and resource-constrained environments for two main reasons: first, exchange values provide a system of credits and debits ... See full document

14

Codes of groupoids with one-sided quasigroup conditions

Codes of groupoids with one-sided quasigroup conditions

... Abstract. We propose a method of description of quasi- group conditions defining one-sided quasigroup classes and one- sided quasigroup varieties by number codes. This method can be used for all ... See full document

18

Random walks in random environments

Random walks in random environments

... a random walk with nearest- neighbor jumps in independent identically distributed ...(i.i.d.) random environment in one dimension, al- though we shall also comment on some generaliza- ... See full document

21

Pseudo Random Generator Based Public Key Cryptography

Pseudo Random Generator Based Public Key Cryptography

... pseudo random generator using public key Cryptography is an efficient system for correction of channel decoding results of messages which are protected by security ... See full document

5

08 _   Chapter 8 - Scheduling Resources.ppt

08 _ Chapter 8 - Scheduling Resources.ppt

... EMR Project —Time Constrained Resource Usage View, —Time Constrained Resource Usage View, January 15–23. January 15–23[r] ... See full document

40

AN ORDEAL RANDOM DATA ENCRYPTION SCHEME (ORDES)

AN ORDEAL RANDOM DATA ENCRYPTION SCHEME (ORDES)

... Motivation behind our work: Despite the well-known weaknesses of DES, the cipher is still widely deployed and used. In addition, DES-like ciphers are being suggested as a solution for encryption in RFID systems [17]. All ... See full document

12

A Simulation Based Optimization Approach for Stochastic Resource Constrained Project Management with Milestones

A Simulation Based Optimization Approach for Stochastic Resource Constrained Project Management with Milestones

... the number of decision variables in the optimization model ...the number of activities or resources involved in a project ...the number of decision variables that the model needs to contemplate also ... See full document

302

Constrained  Verifiable  Random  Functions

Constrained Verifiable Random Functions

... Verifiable random functions turned out a lot harder to construct than ...Boneh-Waters constrained PRFs rely: the DDH as- sumption adapted to the multilinear-map ...the constrained PRFs from [BW13] ... See full document

25

Azithromycin for treatment of bronchiolitis obliterans syndrome in adult lung transplant recipients

Azithromycin for treatment of bronchiolitis obliterans syndrome in adult lung transplant recipients

... a number of studies published, with results ranging from no improvement in lung function (Porhownik 2008) to slowing the progression of disease (Shitrit 2005) and improved life expectancy (Jain 2010; Yates ... See full document

15

Biasing a ring oscillator based true random number generator with an electro magnetic fault injuction using harmonic waves

Biasing a ring oscillator based true random number generator with an electro magnetic fault injuction using harmonic waves

... The number of invert- ers chained is uneven and the last inverter is input for the first inverter, thus making it a ...is based on the number of inverters multiplied by the delay of an ...on ... See full document

88

Show all 10000 documents...