De-Correlation and De-Bias Post-Processing Circuits for True Random Number Generator

R Zhang, H Zhang, X Wang, Y Ziyang… - … on Circuits and …, 2024 - ieeexplore.ieee.org
True random number generators (TRNGs) are commonly used in hardware security for
secure authentication, data encryption, etc. The raw random numbers often exhibit defects …

True Random Number Generation Using Dark Noise Modulation of a Single-Photon Avalanche Diode

MS Sajal, M Dandin - … Transactions on Circuits and Systems II …, 2023 - ieeexplore.ieee.org
This brief presents the application of perimeter-gated single-photon avalanche diodes (pg-
SPADs) as true random number generators (TRNGs). Typical SPADs have been used as …

Stochastic Adder Circuits with Improved Entropy Output

M Batelić, M Stipčević - Entropy, 2023 - mdpi.com
Random pulse computing (RPC), the third paradigm along with digital and quantum
computing, draws inspiration from biology, particularly the functioning of neurons. Here, we …

Controlled alternate quantum walk-based block hash function

D Li, P Ding, Y Zhou, Y Yang - Quantum Information Processing, 2023 - Springer
The hash function is an important branch of cryptology. The controlled quantum walk-based
hash function, which is presented by Li, is a kind of novel hash function. It is safe, flexible …

RAVA: An open hardware true random number generator based on avalanche noise

G Guerrer - IEEE Access, 2023 - ieeexplore.ieee.org
Entropy is a crucial resource in the domains of cryptography, artificial intelligence, and
science. This paper introduces RAVA, a true random number generator based on avalanche …

Statistical testing of random number generators and their improvement using randomness extraction

C Foreman, R Yeung, FJ Curchod - arXiv preprint arXiv:2403.18716, 2024 - arxiv.org
Random number generators (RNGs) are notoriously hard to build and test, especially in a
cryptographic setting. Although one cannot conclusively determine the quality of an RNG by …

Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the …

M Stipčević - Entropy, 2023 - mdpi.com
True randomness is necessary for the security of any cryptographic protocol, including
quantum key distribution (QKD). In QKD transceivers, randomness is supplied by one or …

A precise bare simulation approach to the minimization of some distances. II. Further Foundations

M Broniatowski, W Stummer - arXiv preprint arXiv:2402.08478, 2024 - arxiv.org
The constrained minimization (respectively maximization) of directed distances and of
related generalized entropies is a fundamental task in information theory as well as in the …

Efficiency improvement of photon arrival time based quantum random number generator with hashing

B Solymos, L Bacsárdi - 2023 IEEE 17th International …, 2023 - ieeexplore.ieee.org
Quantum random number generators can deliver entropy based on inherently non-
deterministic physical phenomena, which is essential for applications where quality …

Enhancing Security of BB84 Quantum key Distribution Protocol against Detector Blinding Attacks by Use of an Active Quantuam Entropy Source in the Receiving …

M Stipčević - 2023 - preprints.org
True randomness is necessary for the security of any cryptographic protocol, including
quantum key distribution (QKD). In QKD transceivers, randomness is supplied by one or …