Pseudo Random Number Generators (PRNGs) play a pivotal role in generating key sequences of cryptographic protocols. The cryptographic system’s security depends upon the randomness of the random number generator, it’s unpredictability and its regeneracy. PUF has been used from a long time to generate random numbers and the benefit of using PUF as RNG is that it cannot be cloned and thus the random numbers cannot be regenerated on other system. But in the current scenario the PUFs can be modeled and are susceptible to emulation and man-in-the-middle attack. Among different schemes, a simple Chaotic Pseudo Random Number Generator (CPRNG) exhibits the property of being extremely sensitive to the initial seed and hence unpredictable. But, CPRN...
In this paper we propose a new architecture Physical Random Functions (or Physical Unclonable Functi...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
International audienceAs any well-designed information security application uses a very large quanti...
Pseudorandom number generators (PRNGs) play a pivotal role in generating key sequences of cryptograp...
In the present scenario of cryptographic protocols, Physical Unclonable Functions(PUF) is regarded a...
International audienceGenerating random numbers is essential in manycryptographic applications like ...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
Pseudo-random number generators (PRNGs) play an important role in both areas of computersimulation a...
Security and cryptography are key elements in constrained devices such as IoT, smart card, embedded ...
The information transmission domain had well been extended by the recent and fast developments in th...
In this paper, a new pseudorandom number generator (PRNG) based on the logistic map has been propose...
Recent research showed that the chaotic maps are considered as alternative methods for generating ps...
International audienceIn this paper, we present a new pseudorandom number generator (PRNG) on graphi...
Recent research showed that the chaotic maps are considered as alternative methods for generating ps...
This paper presents a novel, real time, high speed and robust chaos-based pseudo random number gener...
In this paper we propose a new architecture Physical Random Functions (or Physical Unclonable Functi...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
International audienceAs any well-designed information security application uses a very large quanti...
Pseudorandom number generators (PRNGs) play a pivotal role in generating key sequences of cryptograp...
In the present scenario of cryptographic protocols, Physical Unclonable Functions(PUF) is regarded a...
International audienceGenerating random numbers is essential in manycryptographic applications like ...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
Pseudo-random number generators (PRNGs) play an important role in both areas of computersimulation a...
Security and cryptography are key elements in constrained devices such as IoT, smart card, embedded ...
The information transmission domain had well been extended by the recent and fast developments in th...
In this paper, a new pseudorandom number generator (PRNG) based on the logistic map has been propose...
Recent research showed that the chaotic maps are considered as alternative methods for generating ps...
International audienceIn this paper, we present a new pseudorandom number generator (PRNG) on graphi...
Recent research showed that the chaotic maps are considered as alternative methods for generating ps...
This paper presents a novel, real time, high speed and robust chaos-based pseudo random number gener...
In this paper we propose a new architecture Physical Random Functions (or Physical Unclonable Functi...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
International audienceAs any well-designed information security application uses a very large quanti...