True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. Metastability is a way to generate true random numbers. By using electromagnetic radiation, a flip-flop in a metastable state can be manipulated to a known state. In this work, we introduce and analyze the concept of a randomized bit-cell, being able to simultaneously produce random numbers and detect active nonintrusive attacks. The experimental comparison with a standard TRNG yields an 11.5 times better distribution of zeros and ones while the TRNGs are under attack. The concept is extended by using a corrector. A perfect distribution can be gained at the expense of a delay which is proportional to the quality of the random source
International audienceRandom number generators (RNGs) are computational or physical functions genera...
True random number generators (TRNGs) use physical randomness as entropy sources and are heavily use...
Random number generation is a key function of today’s secure devices. Commonly used for key generati...
True random number generators (tRNG) use a physical source of randomness such as thermal noise, or t...
Pseudorandom number generators are algorithmic and thus, predict-able. Ideally cryptography, simulat...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
International audiencePhysical True Random Number Generator (P-TRNG) is a cryptographic primitive ba...
Pseudorandom number generators are algorithmic and thus, predictable. Ideally cryptography, simulati...
This paper presents a post-processing algorithm for a true random number generator (TRNG). Once the ...
Abstract Random numbers are needed in many areas: cryptography, Monte Carlo computation and simulati...
A true random number generator (TRNG) with time multiplexed metastability-based sources of randomnes...
Research in the sphere of random number generators is a dynamically evolving segment. The sequences ...
A true random number generator (TRNG) with time multiplexed metastability-based sources of randomnes...
© 2018 IEEE. Random number generation is a key function of today's secure devices. Commonly used for...
International audienceRandom number generators (RNGs) are computational or physical functions genera...
True random number generators (TRNGs) use physical randomness as entropy sources and are heavily use...
Random number generation is a key function of today’s secure devices. Commonly used for key generati...
True random number generators (tRNG) use a physical source of randomness such as thermal noise, or t...
Pseudorandom number generators are algorithmic and thus, predict-able. Ideally cryptography, simulat...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
International audiencePhysical True Random Number Generator (P-TRNG) is a cryptographic primitive ba...
Pseudorandom number generators are algorithmic and thus, predictable. Ideally cryptography, simulati...
This paper presents a post-processing algorithm for a true random number generator (TRNG). Once the ...
Abstract Random numbers are needed in many areas: cryptography, Monte Carlo computation and simulati...
A true random number generator (TRNG) with time multiplexed metastability-based sources of randomnes...
Research in the sphere of random number generators is a dynamically evolving segment. The sequences ...
A true random number generator (TRNG) with time multiplexed metastability-based sources of randomnes...
© 2018 IEEE. Random number generation is a key function of today's secure devices. Commonly used for...
International audienceRandom number generators (RNGs) are computational or physical functions genera...
True random number generators (TRNGs) use physical randomness as entropy sources and are heavily use...
Random number generation is a key function of today’s secure devices. Commonly used for key generati...