Lightweight physical layer security schemes that have recently attracted a lot of attention include physical unclonable functions (PUFs), RF fingerprinting/proximity based …
E Almaraz Luengo, J Román Villaizán - Mathematics, 2023 - mdpi.com
There are several areas of knowledge in which (pseudo-) random numbers are necessary, for example, in statistical–mathematical simulation or in cryptography and system security …
M Srinivasan, S Skaperas, M Mitev… - … Machine Learning in …, 2023 - ieeexplore.ieee.org
While the literature on channel state information (CSI)-based authentication and key distillation is vast, the two topics have customarily been studied separately. This paper …
G Kumaresan, NP Gopalan - International journal of computer …, 2017 - mecs-press.org
Security and confidentiality are the major concerns in information technology enabled services wherein data security, user authentication, industrial security and message …
This article presents the results of studies of design pseudorandom sequence generators using code-based cryptosystems. The resistance of this generators type is based on the …
МА Иванов - Вопросы кибербезопасности, 2019 - cyberleninka.ru
Отмечается трудоемкость решения задач защиты информации в условиях появления и развития новых IT-технологий, широкое распространение которых не только создает …
ML Rivas Becerra, JJR Panduro, S Ortega Cisneros… - Electronics, 2024 - mdpi.com
This paper presents the design of a new neuro-generator of pseudorandom number type PRNG Pseudorandom Number Generator, which produces complex sequences with an …
S Yu, P Krzysztof, L Yan, V Maksymovych… - Measurement Science …, 2022 - sciendo.com
In information security systems, the algorithm of the Blum-Blum-Shub (BBS) generator, which is based on the use of a one-way function and is a cryptographically secure …
Subject of research: crypto-resistant methods and tools of generating random sequences and hardware support of cryptographic transformations in IoT devices. The aim of the article …