Quantum random number generators
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …
applications in simulation and cryptography. The inherent randomness at the core of …
Stochastic memory devices for security and computing
With the widespread use of mobile computing and internet of things, secured communication
and chip authentication have become extremely important. Hardware‐based security …
and chip authentication have become extremely important. Hardware‐based security …
Power-up SRAM state as an identifying fingerprint and source of true random numbers
DE Holcomb, WP Burleson, K Fu - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Intermittently powered applications create a need for low-cost security and privacy in
potentially hostile environments, supported by primitives including identification and random …
potentially hostile environments, supported by primitives including identification and random …
Physical layer secret key generation in static environments
N Aldaghri, H Mahdavifar - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …
[PDF][PDF] Global optimization algorithms-theory and application
T Weise - Self-Published Thomas Weise, 2009 - researchgate.net
This e-book is devoted to global optimization algorithms, which are methods to find optimal
solutions for given problems. It especially focuses on Evolutionary Computation by …
solutions for given problems. It especially focuses on Evolutionary Computation by …
Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems
Traditionally, chaotic systems are built on the domain of infinite precision in mathematics.
However, the quantization is inevitable for any digital devices, which causes dynamical …
However, the quantization is inevitable for any digital devices, which causes dynamical …
[PDF][PDF] Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
DE Holcomb, WP Burleson, K Fu - Proceedings of the Conference …, 2007 - academia.edu
RFID applications create a need for low-cost security and privacy in potentially hostile
environments. Our measurements show that initialization of SRAM produces a physical …
environments. Our measurements show that initialization of SRAM produces a physical …
Quantum key distribution and 1 Gbps data encryption over a single fibre
We perform quantum key distribution (QKD) over a single fibre in the presence of four
classical channels in a C-band dense wavelength division multiplexing (DWDM) …
classical channels in a C-band dense wavelength division multiplexing (DWDM) …
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
We introduce Slender PUF protocol, an efficient and secure method to authenticate the
responses generated from a Strong Physical Unclonable Function (PUF). The new method …
responses generated from a Strong Physical Unclonable Function (PUF). The new method …
Analysis and enhancement of random number generator in FPGA based on oscillator rings
K Wold, CH Tan - International journal of reconfigurable …, 2009 - Wiley Online Library
A true random number generator (TRNG) is an important component in cryptographic
systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper …
systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper …