Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. A...
The future security of Internet of Things is a key concern in the cyber-security field. One of the k...
International audienceIn this paper, we provide a complete set of algorithms aimed at the design and...
This thesis is focused on exploring the sources of entropy. It includes a description of random numb...
Cryptographic Pseudorandom Number Generators (CPRNG) play a very crucial role in Internet of Things ...
Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and A...
This paper is focused on generating random number via entropy generators. There are described source...
International audienceFinding entropy sources is a major issue to design non-deterministic random ge...
© 2017 Association for Computing Machinery.This research aims to design a hardware random number gen...
Random Number Generators (RNG) find use throughout all applications of computing, from high level st...
Abstract: One of the services provided by the operating system to the applications is random number ...
Many computer applications use random numbers as an important computational resource, and they often...
Abstract. Large sequences of random information are the foundation for a large class of applications...
This paper introduces the dual-entropy method for oscillator-based digital random number generators ...
This paper presents a system for gathering electromagnetic noise to extract surrounding entropy at 4...
none2noGood quality entropy sources are indispensable in most modern cryptographic protocols. Unfort...
The future security of Internet of Things is a key concern in the cyber-security field. One of the k...
International audienceIn this paper, we provide a complete set of algorithms aimed at the design and...
This thesis is focused on exploring the sources of entropy. It includes a description of random numb...
Cryptographic Pseudorandom Number Generators (CPRNG) play a very crucial role in Internet of Things ...
Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and A...
This paper is focused on generating random number via entropy generators. There are described source...
International audienceFinding entropy sources is a major issue to design non-deterministic random ge...
© 2017 Association for Computing Machinery.This research aims to design a hardware random number gen...
Random Number Generators (RNG) find use throughout all applications of computing, from high level st...
Abstract: One of the services provided by the operating system to the applications is random number ...
Many computer applications use random numbers as an important computational resource, and they often...
Abstract. Large sequences of random information are the foundation for a large class of applications...
This paper introduces the dual-entropy method for oscillator-based digital random number generators ...
This paper presents a system for gathering electromagnetic noise to extract surrounding entropy at 4...
none2noGood quality entropy sources are indispensable in most modern cryptographic protocols. Unfort...
The future security of Internet of Things is a key concern in the cyber-security field. One of the k...
International audienceIn this paper, we provide a complete set of algorithms aimed at the design and...
This thesis is focused on exploring the sources of entropy. It includes a description of random numb...