ACM Transactions on Modeling and Computer Simulation (TOMACS)
High-speed digital design: a handbook of black magic
High-speed digital design: a handbook of black magic
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Handbook of Applied Cryptography
Handbook of Applied Cryptography
High-Speed Digital System Design: A Handbook of Interconnect Theory and Design Practices
High-Speed Digital System Design: A Handbook of Interconnect Theory and Design Practices
Evaluating Metastability in Electronic Circuits for Random Number Generation
WVLSI '01 Proceedings of the IEEE Computer Society Workshop on VLSI 2001
Probabilistic And Statistical Methods In Cryptology: An Introduction By Selected Topics (Lecture Notes in Computer Science)
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks
IEEE Transactions on Computers
Measured Flip-Flop Responses to Marginal Triggering
IEEE Transactions on Computers
A True Random Number Generator with Built-in Attack Detection
DEPCOS-RELCOMEX '08 Proceedings of the 2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX
Hi-index | 0.00 |
True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. In this work, we introduce, extend and analyse the concept of the randomised bit cell (RBC), introducing a second meta-level of randomisation, being able to simultaneously produce random numbers and detect active non-intrusive attacks. The concept is extended by using a corrector. Meta-stability is one way to generate true random numbers. By using electromagnetic radiation, a flip-flop (ff) in a meta-stable state can be manipulated to a known state. We clarify and comprehend open issues of meta-stable ffs such as power consumption and electromagnetic field strength. The experimental comparison though a software simulation with a standard TRNG yields a 17.69 times better distribution of zeros and ones while the TRNGs are under attack at the expense of a delay which is proportional to the quality of the random source.