Search
Search Results
-
Protecting Medical Images with Biometric Information
Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital... -
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
Linear Feedback Shift Registers (LFSRs) are used as building blocks for many stream ciphers, wherein, an n-degree primitive connection polynomial is... -
Cryptanalysis Based on 2-Adic Rational Approximation
This paper presents a new algorithm for cryptanalytically attacking stream ciphers. There is an associated measure of security, the 2-adic span. In... -
On the Linear Span of Binary Sequences Obtained from Finite Geometries
A class of periodic binary sequences that are obtained from the incidence vectors of hyperplanes in finite geometries is defined, and a general...