A review on applications of chaotic maps in pseudo-random number generators and encryption

RB Naik, U Singh - Annals of Data Science, 2024 - Springer
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …

Design and test of an integrated random number generator with all-digital entropy source

L Crocetti, S Di Matteo, P Nannipieri, L Fanucci… - Entropy, 2022 - mdpi.com
In the cybersecurity field, the generation of random numbers is extremely important because
they are employed in different applications such as the generation/derivation of …

Secure elliptic curve crypto-processor for real-time IoT applications

S Di Matteo, L Baldanzi, L Crocetti, P Nannipieri… - Energies, 2021 - mdpi.com
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and
low latencies are required, along with security requirements to protect the large number of …

Hardware design of an advanced-feature cryptographic tile within the european processor initiative

P Nannipieri, L Crocetti, S Di Matteo… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
This work describes the hardware implementation of a cryptographic accelerators suite,
named Crypto-Tile, in the framework of the European Processor Initiative (EPI) project. The …

Review of methodologies and metrics for assessing the quality of random number generators

L Crocetti, P Nannipieri, S Di Matteo, L Fanucci… - Electronics, 2023 - mdpi.com
Random number generators are a key element for various applications, such as computer
simulation, statistical sampling, and cryptography. They are used to generate/derive …

VLSI design of Advanced-Features AES CryptoProcessor in the framework of the European Processor Initiative

P Nannipieri, S Di Matteo, L Baldanzi… - … Transactions on Very …, 2021 - ieeexplore.ieee.org
This article presents a cryptographic hardware (HW) accelerator supporting multiple
advanced encryption standard (AES)-based block cipher modes, including the more …

Development of additive Fibonacci generators with improved characteristics for cybersecurity needs

V Maksymovych, M Shabatura, O Harasymchuk… - Applied Sciences, 2022 - mdpi.com
Pseudorandom sequence generation is used in many industries, including cryptographic
information security devices, measurement technology, and communication systems. The …

[PDF][PDF] Working with cryptographic key information

NM Mukhammadovich, AR Djuraevich - International Journal of …, 2023 - academia.edu
Cryptographic protection of information (CPI) is an effective way and a key component of the
entire spectrum of issues of information security in information systems (IS) and information …

High-efficiency TRNG design based on multi-bit dual-ring oscillator

Y Lu, Y Yang, R Hu, H Liang, M Yi… - ACM Transactions on …, 2023 - dl.acm.org
Unpredictable true random numbers are required in security technology fields such as
information encryption, key generation, mask generation for anti-side-channel analysis …

Quantum randomness in cryptography—a survey of cryptosystems, RNG-based ciphers, and QRNGs

A Saini, A Tsokanos, R Kirner - Information, 2022 - mdpi.com
Cryptography is the study and practice of secure communication with digital data and
focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) …