2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX 2008
DOI: 10.1109/depcos-relcomex.2008.10
|View full text |Cite
|
Sign up to set email alerts
|

A True Random Number Generator with Built-in Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…This work deals with TRNG and is an extension and abstraction to the paper presented by Fechner (2008). In contrary to pseudo RNGs (PRNGs), e.g., based on linear congruency (Knuth, 1997) or the Mersenne Twister (Matsumoto and Kurita, 1992), TRNGs are able to produce a non-periodic sequence of bits.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This work deals with TRNG and is an extension and abstraction to the paper presented by Fechner (2008). In contrary to pseudo RNGs (PRNGs), e.g., based on linear congruency (Knuth, 1997) or the Mersenne Twister (Matsumoto and Kurita, 1992), TRNGs are able to produce a non-periodic sequence of bits.…”
Section: Related Workmentioning
confidence: 99%
“…Note, that we are also able to detect local manipulations. A mechanism to detect permanent faults through manipulation of the attack signal is use dual-rail-logic (Fechner and Osterloh, 2008). In this case, every stuck-at fault is detected by comparing both signals by using an external circuit within the perfection core.…”
mentioning
confidence: 99%