Skip to main content
La Teoria del Caos applicata alla generazione di numeri casuali attraverso il circuito di Chua
    • by 
    •   9  
      Chaos TheoryCryptographyElectronic CircuitsPseudo-Random Number Generator
La formación de profesionales con capacidad crítica ha sido un tema de interés no sólo como iniciativa particular de las instituciones de Educación Superior, sino también para la Organización de las Naciones Unidas para la Educación, la... more
    • by 
    • PRNG
    • by 
    •   15  
      FPGAField-Programmable Gate ArraysComparative StudyCommunication System
    • by 
    •   4  
      Pseudo-Random Number GeneratorLinear Congruential GeneratorLCGPRNG
    • by 
    •   3  
      PRNGStream CipherLFSR
A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a... more
    • by 
    •   4  
      Mouse MovementPRNG2-D Chaotic mapDiffusion property
OpenCL is an open standard for parallel programming of heterogeneous compute devices, such as GPUs, CPUs, DSPs or FPGAs. However, the verbosity of its C host API can hinder application development. In this paper we present cf4ocl, a... more
    • by  and +1
    •   3  
      C ProgrammingOpenCLPRNG
    • by 
    •   7  
      Food ChemistryComputer SimulationTycheRandom Number Generation
    • by 
    •   3  
      EntropyPRNGRandom Numbers
Cloud computing becomes the next generation architecture of IT Enterprise. Clouds are massively complex systems. They can be reduced to simple primitives, that are replicated thousands of times, and common functional units. The complexity... more
    • by 
    •   20  
      Computer ScienceComplexity TheoryComplex SystemsCryptography
    • by 
    •   16  
      Hash FunctionsCryptanalysisProvable SecurityDesign Strategy
    • by 
    •   16  
      Hash FunctionsCryptanalysisProvable SecurityDesign Strategy
    • by 
    •   12  
      Mathematics of CryptographyComputer ScienceChaotic MapChaos Based Image Encryption and Decryption in Secure Communication
    • by 
    •   20  
      Computer ScienceFPGACryptographyField-Programmable Gate Arrays
Elliptic Curve Digital Signature Algorithm (ECDSA) provides several security services for resource-constrained embedded devices. It can be the target of attacks as Side-channel attacks. The ECDSA level security can be enhanced by tuning... more
    • by 
    •   15  
      Computer ScienceFPGAHardware Description LanguagesECDSA
    • by 
    •   5  
      C ProgrammingComputer SoftwareOpenCLEnvironmental Science and Computer Programming
Random numbers are used for many purposes like generating data encryption keys, simulating and modeling complex phenomena and for selecting samples randomly from larger datasets. They can also used in literature, music and popular for... more
    • by 
    •   4  
      PRNGXilinxRandom NumbersInternational Journal of Electronics and Communication Engineering and Technology (IJECET)
    • by 
    •   9  
      RFIDSecurity and PrivacyComputer SoftwareInformation Science and Engineering