Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum random number generators
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …
applications in simulation and cryptography. The inherent randomness at the core of …
Stochastic memory devices for security and computing
With the widespread use of mobile computing and internet of things, secured communication
and chip authentication have become extremely important. Hardware‐based security …
and chip authentication have become extremely important. Hardware‐based security …
Physical layer secret key generation in static environments
Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …
Power-up SRAM state as an identifying fingerprint and source of true random numbers
Intermittently powered applications create a need for low-cost security and privacy in
potentially hostile environments, supported by primitives including identification and random …
potentially hostile environments, supported by primitives including identification and random …
[PDF][PDF] Global optimization algorithms-theory and application
T Weise - Self-Published Thomas Weise, 2009 - researchgate.net
This e-book is devoted to global optimization algorithms, which are methods to find optimal
solutions for given problems. It especially focuses on Evolutionary Computation by …
solutions for given problems. It especially focuses on Evolutionary Computation by …
Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems
Traditionally, chaotic systems are built on the domain of infinite precision in mathematics.
However, the quantization is inevitable for any digital devices, which causes dynamical …
However, the quantization is inevitable for any digital devices, which causes dynamical …
[PDF][PDF] Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
RFID applications create a need for low-cost security and privacy in potentially hostile
environments. Our measurements show that initialization of SRAM produces a physical …
environments. Our measurements show that initialization of SRAM produces a physical …
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
We introduce Slender PUF protocol, an efficient and secure method to authenticate the
responses generated from a Strong Physical Unclonable Function (PUF). The new method …
responses generated from a Strong Physical Unclonable Function (PUF). The new method …
Quantum key distribution and 1 Gbps data encryption over a single fibre
We perform quantum key distribution (QKD) over a single fibre in the presence of four
classical channels in a C-band dense wavelength division multiplexing (DWDM) …
classical channels in a C-band dense wavelength division multiplexing (DWDM) …
FPGA-based true random number generation using programmable delays in oscillator-rings
True random number generators (TRNGs) play a fundamental role in cryptographic systems.
This brief presents a new and efficient method to generate true random numbers on field …
This brief presents a new and efficient method to generate true random numbers on field …