Towards an Oscillator Based TRNG with a Certified Entropy Rate
نویسندگان
چکیده
منابع مشابه
Fast Digital TRNG Based on Metastable Ring Oscillator
In this paper, a new true random number generator (TRNG), based entirely on digital components is proposed. The design has been implemented using a fast random number generation method, which is dependent on a new type of ring oscillator with the ability to be set in metastable mode. Earlier methods of random number generation involved employment of jitter, whereas the proposed method leverages...
متن کاملEmbedded Evaluation of Randomness in Oscillator Based Elementary TRNG
Jittery clock signals produced in oscillators, particularly in ring oscillators are commonly used as a source of randomness in true random number generators (TRNG). The robustness of the generators, and hence their security, is closely linked to the entropy of the generated bit stream, which depends on the size of the jitter. Known jitter size can be used as an input parameter in a stochastic m...
متن کاملAnalysis of Randomness Sources in Transition Effect Ring Oscillator based TRNG
We present a deeper analysis of recently published Transition Effect Ring Oscillator (TERO). TERO is an entropy source suitable for cryptographic True Random Number Generator (TRNG) embedded in FPGAs. We propose new TERO structure with simplified control adopted for the Actel Fusion FPGAs. An original idea behind the principle lies in the randomness extraction on an oscillatory trajectory when ...
متن کاملTowards an Inquiry-Based Language Learning: Can a Wiki Help?
Wiki use may help EFL instructors to create an effective learning environment for inquiry-based language teaching and learning. The purpose of this study was to investigate the effects of wikis on the EFL learners’ IBL process. Forty-nine EFL students participated in the study while they conducted research projects in English. The Non-wiki group (n = 25) received traditional inquiry instr...
متن کاملTowards Certified Slicing
Slicing is a widely-used technique with applications in e.g. compiler technology and software security. Thus verification of algorithms in these areas is often based on the correctness of slicing, which should ideally be proven independent of concrete programming languages and with the help of well-known verifying techniques such as proof assistants. As a first step in this direction, this cont...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computers
سال: 2015
ISSN: 0018-9340
DOI: 10.1109/tc.2014.2308423