2022
DOI: 10.1109/access.2022.3176609
|View full text |Cite
|
Sign up to set email alerts
|

An Innovative FPGA Implementations of the Secure Frequency Hopping Communication System Based on the Improved ZUC Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…The NIST test consists of a total of fifteen tests and is proposed by the National Institute of Standards and Technology. Each test has a different meaning, and these tests allow us to verify the stochastic statistical properties of the data stream [ 47 ]. The result of each test is measured by the p -value, and if , the test passes.…”
Section: Key Sequence Analysis Of Lzucmentioning
confidence: 99%
“…The NIST test consists of a total of fifteen tests and is proposed by the National Institute of Standards and Technology. Each test has a different meaning, and these tests allow us to verify the stochastic statistical properties of the data stream [ 47 ]. The result of each test is measured by the p -value, and if , the test passes.…”
Section: Key Sequence Analysis Of Lzucmentioning
confidence: 99%
“…With the arrival of the fifth generation age (5G age), the research on the current root phenotyping using an information technology relevant to 5G can boost the development of root study, which helps breeders to solve the problem and make a decision. Figure 1 shows a typical network of 5G [4]. As illustrated via the red dots in the Figure , this network has some BSs (Base Stations) surrounded by a polygon cell, using Y j to symbolize the j th base station and its position [4].…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1 shows a typical network of 5G [4]. As illustrated via the red dots in the Figure , this network has some BSs (Base Stations) surrounded by a polygon cell, using Y j to symbolize the j th base station and its position [4]. If the referenced BS is Y 0 and the coordinate system is selected, it is at the origin, i.e., Y 0 = 0.…”
Section: Introductionmentioning
confidence: 99%
“…The literature [22] designed sawtooth obfuscation, cyclic shift operations, combined with self-reversible matrices and DNA operations to achieve encryption of medical images. The literature [23] combined chaotic sequences with some algorithms including ZUC algorithm for bitstream encryption, scrambling polynomial algorithm and evolutionary DES cryptographic algorithm applied on frequency hopping systems to increase the complexity and security. The literature [24] used two discrete chaotic mappings to generate chaotic sequences to obtain pseudo-random sequences by applying the XOR operation, combined with Arnold map to encrypt plaintexts using a block cipher algorithm, and finally verified the effectiveness of the encryption system on an FPGA platform.…”
Section: Introductionmentioning
confidence: 99%