Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PRNG
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 11:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols
Submitted by aekwall on Mon, 11/29/2021 - 2:27pm
pubcrawl
composability
Compositionality
Cybersecurity
deterministic protocol
NIST STS
PRNG
pseudorandom numbers
Q-trit
quantum cryptography
statistical stability
theoretical cryptography
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
Highly Parallel Seedless Random Number Generation from Arbitrary Thread Schedule Reconstruction
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
computerized data
random key generation
unlimited parallelism
universal concern
uniform probability outcomes
trng
threading
revenue source
reconstruction algorithm
random source
random number generator
multiprocessor
highly parallel seedless random number generation
ENT
DieHarder
data sets
Scalability
compare-and-swap operations
Blum-Elias algorithm
arbitrary thread schedule reconstruction
PRNG
Random sequences
encryption keys
private data
random number generation
probability
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
key generation
random key generation
session key generation
repeated random numbers
randomized numbers
random sequence
pseudorandom number generator algorithm
Pseudo-Random Numbers
PRNG seed
PRNG
NIST Test Suite
Linear Congruential Generator algorithm
Linear Congruential Generator
LCG algorithm
Scalability
entropy source epoch timestamp
Random sequences
Authentication schemes
cryptographic algorithm
random number generation
Entropy
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Hardware Implementation of Dynamic Key Value Based Stream Cipher Using Chaotic Logistic Map
Submitted by grigby1 on Tue, 10/08/2019 - 4:44pm
Random sequences
NIST statistical
nonrecursive key
private key cryptography
PRNG
pseudorandom number generation
pseudorandom sequence generation
pubcrawl
public key cryptography
random key generation
random number generation
Metrics
randomness tests
resilience
Resiliency
Scalability
stream cipher
symmetric key chaos based cryptography
Thermal analysis
Verilog HDL
X-power
Xilinx device
FPGA device
binary sequence
binary sequences
chaos
Chaos based cryptography
chaotic logistic map
Ciphers
dynamic key value based stream cipher
embedded systems
field programmable gate arrays
Field programmable gated array
asymmetric key chaos based cryptography
frequency 62.2 MHz
Hardware
Hardware Security
hardware-based embedded system
Human behavior
key scheduling
key stream
logistic map
Logistics
biblio
Practical Detection of Entropy Loss in Pseudo-Random Number Generators
Submitted by grigby1 on Mon, 05/22/2017 - 1:52pm
bounded model checking
collaboration
composability
entropy loss
Human behavior
Information Assurance
Information Flow
information theoretic security
Metrics
OpenSSL
PRNG
pseudo-random number generator
pubcrawl
Resiliency
Scalability
static analysis
biblio
"A Mutual Authentication Security RFID Protocol Based on Time Stamp"
Submitted by grigby1 on Thu, 02/23/2017 - 12:03pm
privacy security
time stamps
time stamp
security of data
security authentication protocol
RFID technology
RFID
pubcrawl170105 radiofrequency identification
Protocols
PRNG
authentication
privacy
mutual authentication security RFID protocol
mutual authentication
Hash Function
file organisation
encryption
Databases
Cryptographic Protocols