QUAC-TRNG: High-throughput true random number generation using quadruple row activation in commodity DRAM chips

A Olgun, M Patel, AG Yağlıkçı, H Luo… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
True random number generators (TRNG) sample random physical processes to create large
amounts of random numbers for various use cases, including security-critical cryptographic …

A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …

Cryptographically Secured Pseudo-Random Number Generators: Analysis and Testing with NIST Statistical Test Suite

E Almaraz Luengo, J Román Villaizán - Mathematics, 2023 - mdpi.com
There are several areas of knowledge in which (pseudo-) random numbers are necessary,
for example, in statistical–mathematical simulation or in cryptography and system security …

Smart Channel State Information Pre-Processing for Authentication and Symmetric Key Distillation

M Srinivasan, S Skaperas, M Mitev… - … Machine Learning in …, 2023 - ieeexplore.ieee.org
While the literature on channel state information (CSI)-based authentication and key
distillation is vast, the two topics have customarily been studied separately. This paper …

[PDF][PDF] An analytical study of cellular automata and its applications in cryptography

G Kumaresan, NP Gopalan - International journal of computer …, 2017 - mecs-press.org
Security and confidentiality are the major concerns in information technology enabled
services wherein data security, user authentication, industrial security and message …

Testing of code-based pseudorandom number generators for post-quantum application

A Kuznetsov, A Kiian, O Smirnov… - 2020 IEEE 11th …, 2020 - ieeexplore.ieee.org
This article presents the results of studies of design pseudorandom sequence generators
using code-based cryptosystems. The resistance of this generators type is based on the …

Способ обеспечения универсальной защиты информации, пересылаемой по каналу связи

МА Иванов - Вопросы кибербезопасности, 2019 - cyberleninka.ru
Отмечается трудоемкость решения задач защиты информации в условиях появления и
развития новых IT-технологий, широкое распространение которых не только создает …

Design of a New Neuro-Generator with a Neuronal Module to Produce Pseudorandom and Perfectly Pseudorandom Sequences

ML Rivas Becerra, JJR Panduro, S Ortega Cisneros… - Electronics, 2024 - mdpi.com
This paper presents the design of a new neuro-generator of pseudorandom number type
PRNG Pseudorandom Number Generator, which produces complex sequences with an …

[PDF][PDF] Development of modified blum-blum-shub pseudorandom sequence generator and its use in education

S Yu, P Krzysztof, L Yan, V Maksymovych… - Measurement Science …, 2022 - sciendo.com
In information security systems, the algorithm of the Blum-Blum-Shub (BBS) generator,
which is based on the use of a one-way function and is a cryptographically secure …

Crypto-resistant methods and random number generators in internet of things (iot) devices

PS Klimushyn, TM Solianyk, OO Mozhaiev, YV Hnusov… - 2022 - dspace.univd.edu.ua
Subject of research: crypto-resistant methods and tools of generating random sequences
and hardware support of cryptographic transformations in IoT devices. The aim of the article …