2019
DOI: 10.1109/tcsi.2019.2895045
|View full text |Cite
|
Sign up to set email alerts
|

Nano-Intrinsic True Random Number Generation: A Device to Data Study

Abstract: Recent advances in predictive data analytics and ever growing digitalization and connectivity with explosive expansions in industrial and consumer Internet-of-Things (IoT) has raised significant concerns about security of people's identities and data. It has created close to ideal environment for adversaries in terms of the amount of data that could be used for modeling and also greater accessibility for side-channel analysis of security primitives and random number generators. Random number generators (RNGs) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 65 publications
(67 reference statements)
2
19
0
Order By: Relevance
“…The LSTM consists of two hidden layers, with 32 neurons in each layer. A prediction rate of 49.63% has been achieved, further supporting that the unpredictability of our TRNG's bit-sequence is acceptable [30].…”
Section: (A) (C)supporting
confidence: 67%
“…The LSTM consists of two hidden layers, with 32 neurons in each layer. A prediction rate of 49.63% has been achieved, further supporting that the unpredictability of our TRNG's bit-sequence is acceptable [30].…”
Section: (A) (C)supporting
confidence: 67%
“…A good randomness extraction technique should have two key properties. First, it should have high throughput, i.e., extract as much as randomness possible in a short amount of time [79,135], especially important for applications that require high-throughput random number generation (e.g., security applications [13,15,21,31,37,47,69,80,82,95,101,121,135,142,152,159,162], scienti c simulation [21,95]). Second, it should not disturb the physical process [79,135].…”
Section: True Random Number Generatorsmentioning
confidence: 99%
“…Cryptography is one typical method for securing systems against various attacks by encrypting the system's data with keys generated with true random values. Many cryptographic algorithms require random values to generate keys in many standard protocols (e.g., TLS/SSL/RSA/VPN keys) to either 1) encrypt network packets, le systems, and data, 2) select internet protocol sequence numbers (TCP), or 3) generate data padding values [31,37,47,69,80,82,152,162]. TRNGs are also commonly used in authentication protocols and in countermeasures against hardware attacks [31], in which psuedo-random number generators (PRNGs) are shown to be insecure [31,152].…”
Section: Motivation and Goalmentioning
confidence: 99%
See 2 more Smart Citations