The generation of pseudo-random numbers (bits) plays a critical role in a large number of applications such as statistical mechanics, numerical simulations, gaming industry, communication or cryptography. The choice of secret keys for cryptographic primitives largely depends on the quality of random numbers used. These random numbers are fundamental tools in the generation of secret keys and initialization variables of encryption for cryptographic application, masking protocols, or for internet gambling. Chaotic Pseudorandom numbers were found to be very efficient in this aspect. The relevance of chaotic pseudorandom sequences in ensuring security in cryptosystems is considered, at the same time reviewing statistical tests required to make ...
Workshop « Analyse du chaos et applications », December 6, 2019, ENSEA, Cergy.With the rapid develop...
This thesis is related to varies statistical test of pseudorandom number generator. In thisthesis I ...
A remarkable correlation between chaotic systems and cryptography has been established with sensitiv...
Abstract—Guaranteeing the security of information transmit-ted through the Internet, against passive...
Random numbers play a key-role in cryptography, since they are used, e.g., to define enciphering key...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
The article systematizes the basic scientific principles about statistical testing of random and pse...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
True random numbers have gained wide applications in many areas like: com- puter simulation, Mo...
Cryptographic algorithms have played an important role in information security for protecting privac...
The information transmission domain had well been extended by the recent and fast developments in th...
One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to u...
Workshop « Analyse du chaos et applications », December 6, 2019, ENSEA, Cergy.With the rapid develop...
This thesis is related to varies statistical test of pseudorandom number generator. In thisthesis I ...
A remarkable correlation between chaotic systems and cryptography has been established with sensitiv...
Abstract—Guaranteeing the security of information transmit-ted through the Internet, against passive...
Random numbers play a key-role in cryptography, since they are used, e.g., to define enciphering key...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
The article systematizes the basic scientific principles about statistical testing of random and pse...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
True random numbers have gained wide applications in many areas like: com- puter simulation, Mo...
Cryptographic algorithms have played an important role in information security for protecting privac...
The information transmission domain had well been extended by the recent and fast developments in th...
One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to u...
Workshop « Analyse du chaos et applications », December 6, 2019, ENSEA, Cergy.With the rapid develop...
This thesis is related to varies statistical test of pseudorandom number generator. In thisthesis I ...
A remarkable correlation between chaotic systems and cryptography has been established with sensitiv...