International audienceNowadays, chaos-based cryptographicprimitives are used as an alternative to classicalcryptographic primitives for data security. Indeed, thisis because the fact that there is intrinsic randomnessin chaotic signals and ease of designing robust chaosbasedcryptographic primitives. A common andimportant element in chaos-based cryptography isthe Pseudo-Chaotic Number Generator (PCNG).A variety of PCNG with software implementationhas been published in the literature. However, dueto the rapid growth of Internet of Things (IoT),it is necessary to have such primitive in hardwareimplementation such as an FPGA. In this paper weaddress the hardware implementation on SAKURA-GFPGA-board using VHDL, of one of our PCNGs thatwas design...
International audiencePseudorandom number generation (PRNG) is a key element in hardware security pl...
23nd Signal Processing and Communications Applications Conference (SIU) -- MAY 16-19, 2015 -- Inonu ...
International audienceHardware security for an Internet of Things (IoT) or cyber physical system dri...
International audienceNowadays, chaos-based cryptographicprimitives are used as an alternative to cl...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
International audienceChaosbased stream cipher (CSC) has caught the attention of various security...
International audienceIn this study, with an FPGA-board using VHDL, we designed a secure chaos-based...
International audienceAs any well-designed information security application uses a very large quanti...
International audienceLots of researches indicate that the inefficient generation of random numbers ...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- K...
Chaotic systems and chaos-based applications have been commonly used in the fields of engineering re...
Pseudorandom numbers are widely used in information encryption, spread spectrum communication and ot...
In this study, autonomous Lu-Chen (2002) chaotic system has been implemented on FPGA using Heun nume...
International audienceHardware pseudorandom number generators are continuously improved to satisfy b...
International audiencePseudorandom number generation (PRNG) is a key element in hardware security pl...
23nd Signal Processing and Communications Applications Conference (SIU) -- MAY 16-19, 2015 -- Inonu ...
International audienceHardware security for an Internet of Things (IoT) or cyber physical system dri...
International audienceNowadays, chaos-based cryptographicprimitives are used as an alternative to cl...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
International audienceChaosbased stream cipher (CSC) has caught the attention of various security...
International audienceIn this study, with an FPGA-board using VHDL, we designed a secure chaos-based...
International audienceAs any well-designed information security application uses a very large quanti...
International audienceLots of researches indicate that the inefficient generation of random numbers ...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- K...
Chaotic systems and chaos-based applications have been commonly used in the fields of engineering re...
Pseudorandom numbers are widely used in information encryption, spread spectrum communication and ot...
In this study, autonomous Lu-Chen (2002) chaotic system has been implemented on FPGA using Heun nume...
International audienceHardware pseudorandom number generators are continuously improved to satisfy b...
International audiencePseudorandom number generation (PRNG) is a key element in hardware security pl...
23nd Signal Processing and Communications Applications Conference (SIU) -- MAY 16-19, 2015 -- Inonu ...
International audienceHardware security for an Internet of Things (IoT) or cyber physical system dri...