Randomness analysis of pseudo random noise generator using 24-bits LFSR
We have described in previous work the generation of PN-sequence by employing a 4-bit shifted Linear Feedback Shift Register (LFSR) for application into Direct Sequence Spread Spectrum (DSSS) system by simulation. In this paper, is proposed a pseudo random number generator (PRNG) circuit consis...
| Main Authors: | Yaacob, Siti Hazwani, Khan, Sheroz, Al-Khateeb, Khalid A. Saeed, Siddiqi, Mohammad Umar, Habaebi, Mohamed Hadi, Shahid, Zeeshan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
The Institute of Electrical and Electronics Engineers, Inc.
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/41079/ http://irep.iium.edu.my/41079/1/41079.pdf http://irep.iium.edu.my/41079/4/41079_randomness%20analysis_scopus.pdf |
Similar Items
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Adaptive framed pseudo-Bayesian Aloha algorithm with priorities
by: Habaebi, Mohamed Hadi, et al.
Published: (2000)
by: Habaebi, Mohamed Hadi, et al.
Published: (2000)
Impulsive noise mitigation in Haar DWT based OFDM systems
by: Ali, Moaaz Elhag, et al.
Published: (2013)
by: Ali, Moaaz Elhag, et al.
Published: (2013)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Improving the performance of the FPBA algorithm using
random transmitter power levels
by: Habaebi, Mohamed Hadi, et al.
Published: (2001)
by: Habaebi, Mohamed Hadi, et al.
Published: (2001)
A novel PTS based PAPR reduction scheme for FBMC-OQAM system without extra bits transmission of SI
by: Merah, Hocine, et al.
Published: (2020)
by: Merah, Hocine, et al.
Published: (2020)
Gait recognition and effect of noise on the recognition rate
by: Makhdoomi, Nahid A., et al.
Published: (2013)
by: Makhdoomi, Nahid A., et al.
Published: (2013)
Stable multiwavelength erbium-doped random fiber laser
by: Saleh, Suhairie
Published: (2019)
by: Saleh, Suhairie
Published: (2019)
Robust scheduling algorithm for guaranteed bit rate services
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2013)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2013)
Adaptive load balancing algorithm for wireless distributed computing networks
by: Alfaqawi, Mohammed, et al.
Published: (2016)
by: Alfaqawi, Mohammed, et al.
Published: (2016)
Generalized discrete fourier transform based minimization
of PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Retina fundus image mask generation using pseudo parametric modeling technique
by: Aibinu, Abiodun Musa, et al.
Published: (2010)
by: Aibinu, Abiodun Musa, et al.
Published: (2010)
Integration of wavelet packet decomposition and random secret in iris verification
by: Chin, , CS, et al.
Published: (2005)
by: Chin, , CS, et al.
Published: (2005)
Comparative analysis of UWB balance Antipodal
Vivaldi Antenna for array configuration
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
Design and parametric evaluation of UWB antenna for array arrangement
by: Shaikh, Faraz Ahmed, et al.
Published: (2019)
by: Shaikh, Faraz Ahmed, et al.
Published: (2019)
Energy harvesting network with wireless distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2019)
by: Alfaqawi, Mohammed, et al.
Published: (2019)
Low phase noise performance of VCO using MEMS
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
The influence of EDFA’s configurations on the behavioral trends of gain and noise figure
by: Sellami , Ali, et al.
Published: (2006)
by: Sellami , Ali, et al.
Published: (2006)
POWer adaptive random early detection for DiffServ assured forwarding service classes
by: Ng,, B. K, et al.
Published: (2006)
by: Ng,, B. K, et al.
Published: (2006)
Active Queue Management Using Non-Linear Adaptive Random Early Detection Mechanism
by: Ng, Boon Kiong
Published: (2006)
by: Ng, Boon Kiong
Published: (2006)
Impact of random dispersion fluctuations on two-pump fiber optical parametric amplifier performances
by: Othman, N., et al.
Published: (2019)
by: Othman, N., et al.
Published: (2019)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Preliminary analysis of Ku-Band rain fade data for earth-to-satellite path measured in Malaysia
by: Hassan, Dao, et al.
Published: (2011)
by: Hassan, Dao, et al.
Published: (2011)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994)
by: Rajan, Sundar B., et al.
Published: (1994)
Similar Items
-
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014) -
Adaptive framed pseudo-Bayesian Aloha algorithm with priorities
by: Habaebi, Mohamed Hadi, et al.
Published: (2000) -
Impulsive noise mitigation in Haar DWT based OFDM systems
by: Ali, Moaaz Elhag, et al.
Published: (2013) -
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015) -
Improving the performance of the FPBA algorithm using
random transmitter power levels
by: Habaebi, Mohamed Hadi, et al.
Published: (2001)