Abstract Background Information security is very important in today’s digital world, especially cybersecurity. The most common requirement in securing data in all services: confidentiality, digital signature, authentication, and data integrity is generating random keys. These random keys should be tested for randomness. Hardware security is more recommended than software. Hardware security has more speed and less exposure to many attacks than software security. Software security is vulnerable to attacks like buffer overflow attacks, side-channel attacks, and Meltdown–Spectre attacks. Results In this paper, we propose an FPGA Implementation for the adaptive digital chaotic generator. This algorithm is proposed and tested before. We introduce...
International audienceHardware security for an Internet of Things (IoT) or cyber physical system dri...
International audienceChaosbased stream cipher (CSC) has caught the attention of various security...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
International audienceLots of researches indicate that the inefficient generation of random numbers ...
International audienceNowadays, chaos-based cryptographicprimitives are used as an alternative to cl...
International audienceAs any well-designed information security application uses a very large quanti...
International audienceIn this study, with an FPGA-board using VHDL, we designed a secure chaos-based...
International audienceIn this paper, we come up with three secure chaos-based stream ciphers, implem...
There are many problems arises in randomized algorithms whose solutions are fundamentally based on a...
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- K...
Random numbers are widely employed in cryptography and security applications, and they represent one...
International audienceHardware security for an Internet of Things (IoT) or cyber physical system dri...
International audienceChaosbased stream cipher (CSC) has caught the attention of various security...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
International audienceLots of researches indicate that the inefficient generation of random numbers ...
International audienceNowadays, chaos-based cryptographicprimitives are used as an alternative to cl...
International audienceAs any well-designed information security application uses a very large quanti...
International audienceIn this study, with an FPGA-board using VHDL, we designed a secure chaos-based...
International audienceIn this paper, we come up with three secure chaos-based stream ciphers, implem...
There are many problems arises in randomized algorithms whose solutions are fundamentally based on a...
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- K...
Random numbers are widely employed in cryptography and security applications, and they represent one...
International audienceHardware security for an Internet of Things (IoT) or cyber physical system dri...
International audienceChaosbased stream cipher (CSC) has caught the attention of various security...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...