Combined pseudo-random sequence generator for cybersecurity

V Maksymovych, M Shabatura, O Harasymchuk… - Sensors, 2022 - mdpi.com
Random and pseudo-random number and bit sequence generators with a uniform
distribution law are the most widespread and in demand in the market of pseudo-random …

Development of additive Fibonacci generators with improved characteristics for cybersecurity needs

V Maksymovych, M Shabatura, O Harasymchuk… - Applied Sciences, 2022 - mdpi.com
Pseudorandom sequence generation is used in many industries, including cryptographic
information security devices, measurement technology, and communication systems. The …

Simulation of authentication in information-processing electronic devices based on poisson pulse sequence generators

V Maksymovych, E Nyemkova, C Justice, M Shabatura… - Electronics, 2022 - mdpi.com
Poisson pulse sequence generators are quite well studied, have good statistical properties,
are implemented both in software and hardware, but have not yet been used for the purpose …

Cybersecurity and data science

K Szczypiorski - Electronics, 2022 - mdpi.com
Towards the end of the Cold War in 1985, in reference to the theory of leadership for the first
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …

Enhancement of tiny encryption algorithm for resource-constrained WSNs using four connected additive fibonacci generators

AH Zyara, HI Mhaibes… - Journal of Cyber …, 2024 - journals.riverpublishers.com
The usage of wireless sensor networks (WSN) is widespread in industries where data
security is crucial. Due to the energy and computational limits of WSN, the cryptographic …

[PDF][PDF] Development of modified blum-blum-shub pseudorandom sequence generator and its use in education

S Yu, P Krzysztof, L Yan, V Maksymovych… - Measurement Science …, 2022 - sciendo.com
In information security systems, the algorithm of the Blum-Blum-Shub (BBS) generator,
which is based on the use of a one-way function and is a cryptographically secure …

[PDF][PDF] Pseudorandom sequence generator based on the computation of ln 2

I Opirskyy, O Harasymchuk, O Mykhaylova… - 2024 - ceur-ws.org
This paper discusses creating a pseudorandom sequence generator using the natural
logarithm of the number 2 (ln 2) calculator. Pseudorandom sequence generators are key …

Hardware Modified Additive Fibonacci Generators Using Prime Numbers

V Maksymovych, K Przystupa, O Harasymchuk… - … on Computer Science …, 2023 - Springer
The article presents hardware modified additive Fibonacci generators, which use modular
addition, with the base of the prime number. Generators differ from the classical presence in …

ALTERNATIVE PROOF OF THE INFINITUDE PRIMES AND PRIME PROPERTIES

DR Oktaviani, M Habiburrohman… - BAREKENG: Jurnal Ilmu …, 2023 - ojs3.unpatti.ac.id
Prime numbers is one of kind number that have many uses, one of which is cryptography.
The uniqueness of prime numbers in their divisors and distributions causes prime numbers …

[HTML][HTML] 2 Structure of Paper

AH Zyara, HI Mhaibes, QM Shallal - journals.riverpublishers.com
Section 3 examines the literature review. Section 4 presents the theoretical background of
AFG and TEA. Section 5 explains the design and implementation of the proposed work. The …