Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Virendra Sule"'
Publikováno v:
IFAC-PapersOnLine. 55:13-18
Publikováno v:
Mathematics of Control, Signals, and Systems. 34:67-93
This paper develops the analysis of discrete-time periodically time-varying linear systems over finite fields. It is shown that the conditions for the existence of Floquet Transform for periodic linear systems over reals (or complex) do not carry for
Publikováno v:
Mathematics of Control, Signals, and Systems. 33:331-358
This paper considers dynamical systems over finite fields (DSFF) defined by a map in a vector space over a finite field. An associated linear dynamical system is constructed over the space of functions. This system constitutes the well known Koopman
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 23:1545-1571
This paper develops an approach for point addition and doubling on elliptic curves over finite fields using one variable polynomial arithmetic based on Euclidean division. This approach suc...
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811554100
ICMC
ICMC
The paper explores conditions to be satisfied by feedback shift registers (FSRs) to generate a permutation (alternatively a nonsingular map) of the state space over various fields. Such a condition is well known over the binary field \(\mathbb {F}_{2
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aa1ba46aba0886a9f0afb9cbd857a85e
https://doi.org/10.1007/978-981-15-5411-7_9
https://doi.org/10.1007/978-981-15-5411-7_9
Publikováno v:
Journal of Control and Systems Engineering. 5:48-63
Publikováno v:
SSRN Electronic Journal.
Bitcoin uses a specific Koblitz curve secp256k1 is a type of elliptic curve defined by the Standards for Efficient Cryptography Group (SECG). This paper develops an approach for arithmetic (point addition and doubling) on secp256k1 Koblitz curve over
Publikováno v:
Security, Privacy, and Applied Cryptography Engineering ISBN: 9783030358686
SPACE
SPACE
This paper proposes an attack on shift register based stream ciphers. The attack consists of recovering the internal state of the registers at a starting clock instant from which the output stream is available. For a given output stream the evolution
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::12fe35c837754e14097c78bfa8ddc191
https://doi.org/10.1007/978-3-030-35869-3_5
https://doi.org/10.1007/978-3-030-35869-3_5
Publikováno v:
2018 15th IEEE India Council International Conference (INDICON).
This paper first defines regular single port linear networks as those which have all their poles and zeros in the finite complex plane. The definition is then extended to cover linear multiport networks by using poles and zeros of the matrix network
Publikováno v:
2016 International Conference on Computing, Analytics and Security Trends (CAST).
This paper presents an approach for point addition and doubling on elliptic curves over finite fields F p which is based on one variable polynomial division. This is achieved by identifying the plane F p × F p with the extension field F p2 and trans