[PDF][PDF] Recommendation for the entropy sources used for random bit generation

M Sönmez Turan, E Barker, J Kelsey, K McKay… - 2016 - csrc.nist.gov
This publication has been developed by NIST in accordance with its statutory
responsibilities under the 56 Federal Information Security Modernization Act (FISMA) of …

[HTML][HTML] Design and test of an integrated random number generator with all-digital entropy source

L Crocetti, S Di Matteo, P Nannipieri, L Fanucci… - Entropy, 2022 - mdpi.com
In the cybersecurity field, the generation of random numbers is extremely important because
they are employed in different applications such as the generation/derivation of …

TROT: A three-edge ring oscillator based true random number generator with time-to-digital conversion

M Grujić, I Verbauwhede - … on Circuits and Systems I: Regular …, 2022 - ieeexplore.ieee.org
This paper introduces a new true random number generator (TRNG) based on a three-edge
ring oscillator. Our design uses a new technique with a time-to-digital converter to effectively …

A survey of AIS-20/31 compliant TRNG cores suitable for FPGA devices

O Petura, U Mureddu, N Bochard… - … conference on field …, 2016 - ieeexplore.ieee.org
FPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in
cryptographic systems-on-chip (CrySoC). As a building block of CrySoCs, True Random …

ES-TRNG: A high-throughput, low-area true random number generator based on edge sampling

B Yang, V Rožic, M Grujic, N Mentens… - IACR Transactions on …, 2018 - tosc.iacr.org
In this paper we present a novel true random number generator based on high-precision
edge sampling. We use two novel techniques to increase the throughput and reduce the …

True random number generator based on Fibonacci-Galois ring oscillators for FPGA

P Nannipieri, S Di Matteo, L Baldanzi, L Crocetti… - Applied Sciences, 2021 - mdpi.com
Random numbers are widely employed in cryptography and security applications. If the
generation process is weak, the whole chain of security can be compromised: these …

A lightweight full entropy TRNG with on-chip entropy assurance

T Chen, Y Ma, J Lin, Y Cao, N Lv… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
True random number generator (TRNG) as one essential hardware primitive is widely used
in cryptography, Monte Carlo simulation, and gambling. To evaluate the security of TRNG …

Side-channel analysis of the TERO PUF

L Tebelmann, M Pehl, V Immler - International Workshop on Constructive …, 2019 - Springer
Abstract Physical Unclonable Functions (PUFs) have the potential to provide a higher level
of security for key storage than traditional Non-Volatile Memory (NVM). However, the …

Entropy estimation for ADC sampling-based true random number generators

Y Ma, T Chen, J Lin, J Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
True random number generators (TRNGs) are widely used in cryptographic systems, and
their security is the base of many cryptographic algorithms and protocols. At present, entropy …

TRNG Entropy Model in the Presence of Flicker FM Noise

A Peetermans, I Verbauwhede - IACR Transactions on Cryptographic …, 2024 - tches.iacr.org
Flicker Frequency Modulated (FM) noise, which influences free-running Ring Oscillators
(ROs), can make a substantial contribution to the entropy generated by RO-based True …