FPGA-based true random number generation using programmable delays in oscillator-rings

NN Anandakumar, SK Sanadhya… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
True random number generators (TRNGs) play a fundamental role in cryptographic systems.
This brief presents a new and efficient method to generate true random numbers on field …

Set-based obfuscation for strong PUFs against machine learning attacks

J Zhang, C Shen - IEEE transactions on circuits and systems I …, 2020 - ieeexplore.ieee.org
Strong physical unclonable function (PUF) is a promising solution for device authentication
in resource-constrained applications but vulnerable to machine learning (ML) attacks. In …

A novel ultra-compact FPGA-compatible TRNG architecture exploiting latched ring oscillators

R Della Sala, D Bellizia, G Scotti - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this brief we present a novel, ultra-compact, True Random Number Generator (TRNG)
architecture and its FPGA implementation. The proposed Latched Ring Oscillator (LRO) …

High-throughput FPGA-compatible TRNG architecture exploiting multistimuli metastable cells

R Della Sala, D Bellizia, G Scotti - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper presents a True Random Number Generator (TRNG) exploiting latched-XOR
(LX) gates and its implementation on a **linx Spartan 6 FPGA device. The proposed LX …

TROT: A three-edge ring oscillator based true random number generator with time-to-digital conversion

M Grujić, I Verbauwhede - … on Circuits and Systems I: Regular …, 2022 - ieeexplore.ieee.org
This paper introduces a new true random number generator (TRNG) based on a three-edge
ring oscillator. Our design uses a new technique with a time-to-digital converter to effectively …

Exploiting the DD-Cell as an ultra-compact entropy source for an FPGA-based re-configurable PUF-TRNG architecture

R Della Sala, G Scotti - IEEE Access, 2023 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) are
both needed in the Privacy Preserving Mutual Autentication (PPMA) protocol, often used in …

True random number generator based on Fibonacci-Galois ring oscillators for FPGA

P Nannipieri, S Di Matteo, L Baldanzi, L Crocetti… - Applied Sciences, 2021 - mdpi.com
Random numbers are widely employed in cryptography and security applications. If the
generation process is weak, the whole chain of security can be compromised: these …

PUF-based secure chaotic random number generator design methodology

S Kalanadhabhatta, D Kumar… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Pseudorandom number generators (PRNGs) play a pivotal role in generating key
sequences of cryptographic protocols. Among different schemes, a simple chaotic PRNG …

Cryptographically secure pseudo-random number generator IP-core based on SHA2 algorithm

L Baldanzi, L Crocetti, F Falaschi, M Bertolucci, J Belli… - Sensors, 2020 - mdpi.com
In the context of growing the adoption of advanced sensors and systems for active vehicle
safety and driver assistance, an increasingly important issue is the security of the information …

Threats, Attacks, and cryptography frameworks of cybersecurity in critical infrastructures

K Tsantikidou, N Sklavos - Cryptography, 2024 - mdpi.com
Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation
systems, and financial institutions, are vital components of a functioning society, with the …