Showing 1 - 10 results of 10 for search '"Galois fields"', query time: 0.06s Refine Results
  1. 1

    Galois Field Instructions in the Sandblaster 2.0 Architectrue by Mayan Moudgill, Andrei Iancu, Daniel Iancu

    Published 2009-01-01
    “…This paper presents a novel approach to implementing multiplication of Galois Fields with 2N. Elements of GF(2N) can be represented as polynomials of degree less than N over GF(2). …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption by Muhammad Asif, Sayeda Wajiha, Sameh Askar, Hijaz Ahmad

    Published 2024-01-01
    “…The conventional construction of substitution boxes (S-boxes) has long relied on associative algebras such as Galois fields and cyclic groups. However, recent developments have motivated researchers to investigate non-associative algebras. …”
    Get full text
    Article
  6. 6

    Cryptanalysis of hyperchaotic S-box generation and image encryption by Mohammad Mazyad Hazzazi, Gulraiz, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai

    Published 2024-12-01
    “…The proposed S-boxes improve the security features by employing chaotic maps and Galois fields, which go beyond traditional design approaches. …”
    Get full text
    Article
  7. 7

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…The proposed mathematical structure is superior to Galois Field (GF) in terms of complexity and has the ability to create arbitrary randomness due to a larger key space. …”
    Get full text
    Article
  8. 8

    The Projective Character Tables of a Solvable Group 26:6×2 by Abraham Love Prins

    Published 2019-01-01
    “…The Chevalley–Dickson simple group G24 of Lie type G2 over the Galois field GF4 and of order 251596800=212.33.52.7.13 has a class of maximal subgroups of the form 24+6:A5×3, where 24+6 is a special 2-group with center Z24+6=24. …”
    Get full text
    Article
  9. 9

    Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization by Swapneel C. Mhatre, Priya Chandran

    Published 2025-01-01
    “…To demonstrate the use of the simulator generator and the generated simulator, three case studies are considered - simulation of RISC-V with HyperWall, simulation of RISC-V with bit-serial dot-product unit, and simulation of RISC-V with Galois Field arithmetic extension. The paper concludes that the proposed approaches help in accurately simulating the overhead due to security in virtualization and also in providing flexibility to the designer to simulate the desired processor configurations.…”
    Get full text
    Article
  10. 10

    Cooperative and Adaptive Network Coding for Gradient Based Routing in Wireless Sensor Networks with Multiple Sinks by M. E. Migabo, T. O. Olwal, K. Djouani, A. M. Kurien

    Published 2017-01-01
    “…The aggregation is performed by means of linear combinations of random coefficients of a finite Galois Field of variable size GF(2S) at each node and the decoding is performed by means of Gaussian elimination. …”
    Get full text
    Article