Affiliation:
1. Department of Information Technology Engineering, Tohoku Gakuin University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference32 articles.
1. [1] N. Heninger, Z. Durumeric, E. Wustrow, and J.A. Halderman, “Mining your Ps and Qs: Detection of widespread weak keys in network devices,” Proc. 21st USENIX Security Symposium, Aug. 2012, Rev.2, July 11 2012.
2. [2] M. Bellare, S. Goldwasser, and Micciancio, ““Pseudo-random” number generation within cryptographic algorithms: The DSS case,” Proc. Crypto'97, LNCS 1294, IACR, Palo Alto, CA, Springer-Verlag, Berlin 1997. 10.1007/bfb0052242
3. [3] C.S. Petrie and A. Connelly, “A noise-based IC random number generator for applications in cryptography,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol.47, no.5, pp.615-621, 2000. 10.1109/81.847868
4. [4] W.T. Holman, J.A. Connelly, and A. Dowlatabadi, “An integrated analog/digital random noise source,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol.44, no.6, pp.521-528, June 1997. 10.1109/81.586025
5. [5] S. Callegari, R. Rovatti, and G. Setti, “Embeddable ADC-based true random number generator for cryptographic applications exploiting nonlinear signal processing and chaos,” IEEE Trans. Signal Process., vol.53, no.2, pp.793-805, Feb. 2005. 10.1109/tsp.2004.839924
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献