True random numbers have gained wide applications in many areas like: com- puter simulation, Monte Carlo integration, cryptography, randomized compu- tation, radar ranging, and other areas. The generation of random numbers is impractical in real life because of difficulty in reproduction, even under the most legitimate requirements. Unfortunately, the output of physical random sources cannot be reproduced, and therefore cannot be used directly for cryptographic purposes. A deterministically generated pseudorandom (appear to be random) numbers are therefore relied upon. Two constructions for generating pseudo- random sequences were considered, viz: Linear feedback shift registers (LFSR) and cha...
We observe that pseudo-random number generators, familiar to all programmers, are derived from deter...
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated...
International audienceSecurity of information transmitted through the Internet, against passive or a...
One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to u...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Abstract. A scheme for pseudo-random binary sequence generation based on the two-dimensional discret...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
In this work we propose to take certain chaotic systems as a reference for the design of PRNGs based...
A pseudorandom sequence is a repeatable sequence with random statistical properties that is widely u...
35 pages, 16 FiguresComplexity of a particular coordinated system is the degree of difficulty in pre...
A remarkable correlation between chaotic systems and cryptography has been established with sensitiv...
The random sequence generated by linear feedback shift register can’t meet the demand of unpredictab...
This paper shows a new technic applicable for the digital devices that are the result of the finite’...
International audienceThere is not a proper mathematical definition of chaos, we have instead a quit...
We observe that pseudo-random number generators, familiar to all programmers, are derived from deter...
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated...
International audienceSecurity of information transmitted through the Internet, against passive or a...
One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to u...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Abstract. A scheme for pseudo-random binary sequence generation based on the two-dimensional discret...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
In this work we propose to take certain chaotic systems as a reference for the design of PRNGs based...
A pseudorandom sequence is a repeatable sequence with random statistical properties that is widely u...
35 pages, 16 FiguresComplexity of a particular coordinated system is the degree of difficulty in pre...
A remarkable correlation between chaotic systems and cryptography has been established with sensitiv...
The random sequence generated by linear feedback shift register can’t meet the demand of unpredictab...
This paper shows a new technic applicable for the digital devices that are the result of the finite’...
International audienceThere is not a proper mathematical definition of chaos, we have instead a quit...
We observe that pseudo-random number generators, familiar to all programmers, are derived from deter...
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated...
International audienceSecurity of information transmitted through the Internet, against passive or a...