A novel pseudo-random number generator for IoT based on a coupled map lattice system using the generalised symmetric map
Pseudo-random number generators (PRNGs) are one of the building blocks of cryptographic
methods and therefore, new and improved PRNGs are continuously developed. In this …
methods and therefore, new and improved PRNGs are continuously developed. In this …
A new chaos-based PRNG hardware architecture using the HUB fixed-point format
SS Da Silva, M Cardoso, L Nardo… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Chaotic systems have been applied in many applications involving instrumentation and
measurements, such as in sensors and control systems, due to their pseudorandom …
measurements, such as in sensors and control systems, due to their pseudorandom …
Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map
In recent years, there has been an increasing interest in employing chaotic-based random
number generators for cryptographic purposes. However, many of these generators produce …
number generators for cryptographic purposes. However, many of these generators produce …
A Hardware-Efficient Perturbation Method to the Digital Tent Map
Digital chaotic systems used in various applications such as signal processing, artificial
intelligence, and communications often suffer from the issue of dynamical degradation. This …
intelligence, and communications often suffer from the issue of dynamical degradation. This …
An Area Efficient Architecture of a Novel Chaotic System for High Randomness Security in e-Health
An e-Health application must be carefully designed, as a malicious attack has ethical and
legal consequences. While common cryptography protocols enhance security, they also add …
legal consequences. While common cryptography protocols enhance security, they also add …
High randomness hyperchaos-based parameterizable TRNG: Design, FPGA implementation and exhaustive security analysis
Recently, chaotic systems have become a thrilling discipline for information security
applications, particularly in designing entropy sources. This paper presents a novel …
applications, particularly in designing entropy sources. This paper presents a novel …
A Compact Pipelined Architecture of Chaotic Logistic Map for e-Health Applications
A secure architecture of e-Health applications must be carefully approached to ensure
confidentiality, integrity, and authenticity. A malicious attack or privacy breach can have …
confidentiality, integrity, and authenticity. A malicious attack or privacy breach can have …
Experimental Evaluation of Horner's Method for CPU Energy Reduction in Nonlinear Modelling
J Browne, T Nazaré… - 2024 35th Irish Signals …, 2024 - ieeexplore.ieee.org
Computer applications have played a central role in human progress over the past few
decades. Their increasing prevalence has raised concerns about high energy consumption …
decades. Their increasing prevalence has raised concerns about high energy consumption …
A comparison analysis of using different numerical representations in digital chaotic maps
SS da Silva - 2023 - repositorio.ufmg.br
Digital chaotic maps have been used in a variety of applications in the scientific field, such
as in the Monte Carlo simulation and in the generation of pseudorandom numbers …
as in the Monte Carlo simulation and in the generation of pseudorandom numbers …
Design and implementation of chaos-based random number generators for IoT platforms
N Nguyen Thi Thu - 2022 - espace.etsmtl.ca
For future network communication, security is one of the main challenges. In this context, the
random number generator, which is responsible for generating public keys, private keys …
random number generator, which is responsible for generating public keys, private keys …