FPGA-based true random number generation using programmable delays in oscillator-rings
True random number generators (TRNGs) play a fundamental role in cryptographic systems.
This brief presents a new and efficient method to generate true random numbers on field …
This brief presents a new and efficient method to generate true random numbers on field …
Set-based obfuscation for strong PUFs against machine learning attacks
J Zhang, C Shen - IEEE transactions on circuits and systems I …, 2020 - ieeexplore.ieee.org
Strong physical unclonable function (PUF) is a promising solution for device authentication
in resource-constrained applications but vulnerable to machine learning (ML) attacks. In …
in resource-constrained applications but vulnerable to machine learning (ML) attacks. In …
A novel ultra-compact FPGA-compatible TRNG architecture exploiting latched ring oscillators
In this brief we present a novel, ultra-compact, True Random Number Generator (TRNG)
architecture and its FPGA implementation. The proposed Latched Ring Oscillator (LRO) …
architecture and its FPGA implementation. The proposed Latched Ring Oscillator (LRO) …
High-throughput FPGA-compatible TRNG architecture exploiting multistimuli metastable cells
This paper presents a True Random Number Generator (TRNG) exploiting latched-XOR
(LX) gates and its implementation on a **linx Spartan 6 FPGA device. The proposed LX …
(LX) gates and its implementation on a **linx Spartan 6 FPGA device. The proposed LX …
TROT: A three-edge ring oscillator based true random number generator with time-to-digital conversion
This paper introduces a new true random number generator (TRNG) based on a three-edge
ring oscillator. Our design uses a new technique with a time-to-digital converter to effectively …
ring oscillator. Our design uses a new technique with a time-to-digital converter to effectively …
Exploiting the DD-Cell as an ultra-compact entropy source for an FPGA-based re-configurable PUF-TRNG architecture
Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) are
both needed in the Privacy Preserving Mutual Autentication (PPMA) protocol, often used in …
both needed in the Privacy Preserving Mutual Autentication (PPMA) protocol, often used in …
True random number generator based on Fibonacci-Galois ring oscillators for FPGA
Random numbers are widely employed in cryptography and security applications. If the
generation process is weak, the whole chain of security can be compromised: these …
generation process is weak, the whole chain of security can be compromised: these …
PUF-based secure chaotic random number generator design methodology
S Kalanadhabhatta, D Kumar… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Pseudorandom number generators (PRNGs) play a pivotal role in generating key
sequences of cryptographic protocols. Among different schemes, a simple chaotic PRNG …
sequences of cryptographic protocols. Among different schemes, a simple chaotic PRNG …
Cryptographically secure pseudo-random number generator IP-core based on SHA2 algorithm
L Baldanzi, L Crocetti, F Falaschi, M Bertolucci, J Belli… - Sensors, 2020 - mdpi.com
In the context of growing the adoption of advanced sensors and systems for active vehicle
safety and driver assistance, an increasingly important issue is the security of the information …
safety and driver assistance, an increasingly important issue is the security of the information …
Threats, Attacks, and cryptography frameworks of cybersecurity in critical infrastructures
Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation
systems, and financial institutions, are vital components of a functioning society, with the …
systems, and financial institutions, are vital components of a functioning society, with the …