• Aucun résultat trouvé

Pseudo-random number

Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator

Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator

... to pseudo-random number generators (which will be denoted chaotic PRNG in the ...of pseudo- random numbers. Some works study the random properties exhibited by these chaotic ...

7

Chaotic Sampling, Very Weakly Coupling, and Chaotic Mixing: Three Simple Synergistic Mechanisms to Make New Families of Chaotic Pseudo Random Number Generators

Chaotic Sampling, Very Weakly Coupling, and Chaotic Mixing: Three Simple Synergistic Mechanisms to Make New Families of Chaotic Pseudo Random Number Generators

... synergistically three simple new mechanisms: very weakly coupling of chaotic maps, chaotic sampling and chaotic mixing of iterated points in order to make new families of enhanced Chaotic Pseudo Random ...

10

Chaotic Pseudo Random Number Generators via Ultra Weak Coupling of Chaotic Maps and Double Threshold Sampling Sequences

Chaotic Pseudo Random Number Generators via Ultra Weak Coupling of Chaotic Maps and Double Threshold Sampling Sequences

... Index Terms—Chaos, Discrete time systems, Floating point arithmetic, Random number generation. I. I NTRODUCTION Efficient Chaotic Pseudo Random Number Generators (CPRNG) have been ...

6

Pseudo-Random Number Generation on GP-GPU

Pseudo-Random Number Generation on GP-GPU

... these random streams produced on GP-GPU? And more importantly: how can we ensure that they are independent? These two main problems led us to think about design guidelines that will hopefully help developers to ...

16

Quantifying Studies of (Pseudo) Random Number Generation for Cryptography

Quantifying Studies of (Pseudo) Random Number Generation for Cryptography

... denotes the expected state entropy after k iterations. The subsequent chapter is divided in two main sections. In Section 9.2, we discuss ways of estimating the state entropy of our model. We give a short overview of ...

190

Modeling, design and characterization of delay-chains based true random number generator

Modeling, design and characterization of delay-chains based true random number generator

... as random session keys generation, Initialization Vectors (IVs), NONCE (Not Once the same number) and protections against physical attacks ...True Random Number Generator (TRNG) because of its ...

181

Comparative Study of two Pseudo Chaotic Number Generators for Securing the IoT

Comparative Study of two Pseudo Chaotic Number Generators for Securing the IoT

... strong pseudo random number generators (PRNGs), is crucial in securing sensitive ...two pseudo chaotic number generators (PCNGs). The First pseudo chaotic number generator ...

6

On-the-Fly Evaluation of FPGA-Based True Random Number Generator

On-the-Fly Evaluation of FPGA-Based True Random Number Generator

... a random number generator (RNG) is to produce random binary numbers which are statistically independent, uniformly distributed and ...The number of hardware applications requiring RNGs is ...

7

New alternate ring-coupled map for multi-random number generation

New alternate ring-coupled map for multi-random number generation

... 4 Conclusion Classical and emergent applications (chaotic encryp- tion, global warming, multi-agent competition) re- quire efficient PRNG generating independent and multi-random sequences. A new alternate ring- ...

8

NEW ALTERNATE LOZI FUNCTION FOR RANDOM NUMBER GENERATION

NEW ALTERNATE LOZI FUNCTION FOR RANDOM NUMBER GENERATION

... France lozi@unice.fr Introduction The accelerated development of modern data transactions applications such as telecommunications requires encoding techniques with higher standards of security. Classically, these ...

3

On-Line Monitoring of Random Number Generators for Embedded Security

On-Line Monitoring of Random Number Generators for Embedded Security

... the number of hardware applications requiring RNGs is continuously increasing, specially in embedded circuits ...True Random Number Generator (TRNG) and a Pseudo Random Number ...

5

Methodology for the Fault Analysis and Evaluation of True Random Number Generators

Methodology for the Fault Analysis and Evaluation of True Random Number Generators

... tain number of times and H0 will be rejected although the sequence may really be ...not random is β and this event is called a Type II ...infinite number of non-random sequences could pass the ...

16

The number of potential winners in Bradley-Terry model in random environment

The number of potential winners in Bradley-Terry model in random environment

... in random environment where each player faces each other ...be random and we study the influence of their distribu- tions on the asymptotic number of potential ...the number of potential ...

23

The Domination Number of On-line Social Networks and Random Geometric Graphs

The Domination Number of On-line Social Networks and Random Geometric Graphs

... S. Random geometric graphs were first introduced in a slightly different setting by Gilbert [14] to model the communications between radio ...on random geometric graphs is the monograph by Penrose ...

13

Condensation and extremes for a fluctuating number of independent random variables

Condensation and extremes for a fluctuating number of independent random variables

... (a) random allocation models and zero-range processes, (b) tied-down renewal processes, (c) free renewal ...the number of components of the system is kept fixed, for the two other classes it is a ...

55

Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator

Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator

... True random number generators (TRNGs) are essential in data security hard- ...generate random streams of bits used in cryp- tographic systems as confidential keys or random masks, to ...

17

Random number generation with multiple streams for sequential and parallel computing

Random number generation with multiple streams for sequential and parallel computing

... the number of times C a point falls in a subcube in which another point already fell ...(0,1) random variables (so the points are truly uniform and independent), this random variable C has ...

15

Almost-sure asymptotic for the number of heaps inside a random sequence

Almost-sure asymptotic for the number of heaps inside a random sequence

... Heap sorting algorithm for (U i , ν i ). • We start at time 1 with a single tree containing a unique vertex (U 1 , ν 1 ) and set R(1) = 1. • At time n, we have R(n) trees. To each vertex of these trees is associated a ...

9

Pseudo-anneaux de carré nul

Pseudo-anneaux de carré nul

... appelle pseudo-anneau de carré nul tout pseudo-anneau sur lequel la loi multiplicative est ...de pseudo-anneaux toute application f entre deux pseudo-anneaux A, B vérifiant les axiomes d’un ...

1

PAPR Analysis as a Ratio of Two Random Variables: Application to Multicarrier Systems with Low Subcarriers Number

PAPR Analysis as a Ratio of Two Random Variables: Application to Multicarrier Systems with Low Subcarriers Number

... V. S IMULATIONS AND D ISCUSSION A. Simulations Results 1) Nyquist Rate Signal: Simulations have been carried out to show the relevance of the proposed theoretical developments regarding PAPR of multicarrier signal with ...

9

Show all 2175 documents...

Sujets connexes