Journal articles on the topic 'Psedo-Random Bit Generator PRBG'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Psedo-Random Bit Generator PRBG.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
LI, PING, ZHONG LI, WOLFGANG A. HALANG, and GUANRONG CHEN. "ANALYSIS OF A MULTIPLE-OUTPUT PSEUDO-RANDOM-BIT GENERATOR BASED ON A SPATIOTEMPORAL CHAOTIC SYSTEM." International Journal of Bifurcation and Chaos 16, no. 10 (2006): 2949–63. http://dx.doi.org/10.1142/s0218127406016574.
Full textChiang, Yi Te, He Sheng Wang, and Yung Nien Wang. "A Chaotic-Based Pseudo-Random Bit Generator for Navigation Applications." Applied Mechanics and Materials 311 (February 2013): 99–104. http://dx.doi.org/10.4028/www.scientific.net/amm.311.99.
Full textGarcía-Martínez, M., and E. Campos-Cantón. "Pseudo-random bit generator based on lag time series." International Journal of Modern Physics C 25, no. 04 (2014): 1350105. http://dx.doi.org/10.1142/s0129183113501052.
Full textFadhil, Sahib Hasan, and Amer Saffo Maryam. "FPGA Hardware Co-Simulation of Image Encryption using Hybrid Chaotic Maps Based Stream Cipher." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 215–25. https://doi.org/10.35940/ijeat.D6713.049420.
Full textQiu, Jin, and Ping Wang. "Color Image Encryption Scheme Based on Chaotic Map." Applied Mechanics and Materials 182-183 (June 2012): 1800–1804. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1800.
Full textWANG, XINGYUAN, WEI LIU, NINI GU, and HUAGUANG ZHANG. "DIGITAL STREAM CIPHER BASED ON SCS-PRBG." International Journal of Modern Physics B 23, no. 25 (2009): 5085–92. http://dx.doi.org/10.1142/s0217979209053539.
Full textH, Soumya Babu, and Gopakumar K. "ELECTRONIC CIRCUIT REALISATION OF A CHAOTIC PSEUDO RANDOM BIT GENERATOR." ICTACT Journal on Microelectronics 7, no. 2 (2021): 1121–26. https://doi.org/10.21917/ijme.2021.0195.
Full textAhmed, Kamil Hasan Al-Ali, and Mohammed Daif Alkhasraji Jafaar. "Colour image encryption based on hybrid bit-level scrambling, ciphering, and public key cryptography." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1607~1619. https://doi.org/10.11591/eei.v12i3.4728.
Full textAbdulla, M. Abuayyash, and Ajlouni Naim. "Using Permutations to Enhance the Gain of RUQB Technique." International Journal of Information Technology and Web Engineering, April-Jun (April 1, 2018): 30–45. https://doi.org/10.5281/zenodo.1210768.
Full textAl-Ali, Ahmed Kamil Hasan, and Jafaar Mohammed Daif Alkhasraji. "Colour image encryption based on hybrid bit-level scrambling, ciphering, and public key cryptography." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1607–19. http://dx.doi.org/10.11591/eei.v12i3.4728.
Full textAkif, Omar Z., Sura Ali, Rasha Subhi Ali, and Alaa Kadhim Farhan. "A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): 1580–88. http://dx.doi.org/10.11591/eei.v10i3.2610.
Full textOmar, Z. Akif, Mazin Ali Sura, Subhi Ali Rasha, and Kadhim Farhan Alaa. "A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): pp. 1580~1588. https://doi.org/10.11591/eei.v10i3.2610.
Full textTANG, K. W., WALLACE K. S. TANG, and K. F. MAN. "A CHAOS-BASED PSEUDO-RANDOM NUMBER GENERATOR AND ITS APPLICATION IN VOICE COMMUNICATIONS." International Journal of Bifurcation and Chaos 17, no. 03 (2007): 923–33. http://dx.doi.org/10.1142/s021812740701763x.
Full textN, Bharatesh, and Rohith S. "FPGA Implementation of Park-Miller Algorithm to Generate Sequence of 32-Bit Pseudo Random Key for Encryption and Decryption of Plain Text." International Journal of Reconfigurable and Embedded Systems (IJRES) 2, no. 3 (2013): 99. http://dx.doi.org/10.11591/ijres.v2.i3.pp99-105.
Full textPasqualini, Luca, and Maurizio Parton. "Pseudo Random Number Generation through Reinforcement Learning and Recurrent Neural Networks." Algorithms 13, no. 11 (2020): 307. http://dx.doi.org/10.3390/a13110307.
Full textYu, Fei, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, and Sichun Du. "FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient." Chinese Physics B 31, no. 2 (2022): 020505. http://dx.doi.org/10.1088/1674-1056/ac3cb2.
Full textAruna, Mrs S., Ch Soumya Pranathi, A. Siva Madhuri, and K. Neha. "Implementation of Programmable n-bit Pseudo Random Sequence Generator using 45 nm Technology." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 958–66. http://dx.doi.org/10.22214/ijraset.2024.63240.
Full textFahrizal, Muhammad, and Achmad Solichin. "Pengamanan M-Commerce Menggunakan One Time Password Metode Pseudo Random Number Generator (PRNG)." Rabit : Jurnal Teknologi dan Sistem Informasi Univrab 5, no. 2 (2020): 108–16. http://dx.doi.org/10.36341/rabit.v5i2.1363.
Full textKurniasih, Firda, Rini Marwati, and Ririn Sispiyati. "Penggabungan Affine Cipher dan Least Significant Bit-2 untuk Penyisipan Pesan Rahasia pada Gambar." Jurnal EurekaMatika 11, no. 2 (2023): 79–88. http://dx.doi.org/10.17509/jem.v11i2.62115.
Full textArianty, Rini, and Diana Tri Susetianingtias. "KOMBINASI LOGISTIC MAP DAN PSEUDO-RANDOM NUMBER GENERATOR PADA PEMBANGKITAN KUNCI UNTUK ENKRIPSI CITRA DIGITAL." Jurnal Ilmiah Teknologi dan Rekayasa 25, no. 3 (2020): 187–98. http://dx.doi.org/10.35760/tr.2020.v25i3.3120.
Full textBhandari, Jugal Kishore, Yogesh Kumar Verma, and S. K. Hima Bindhu. "Enhancing FPGA Testing Efficiency: A PRBS-Based Approach for DSP Slices and Multipliers." International Journal of Electrical and Electronics Research 12, no. 1 (2024): 139–45. http://dx.doi.org/10.37391/ijeer.120120.
Full textHashmi, Muhammad Asim, and Noshina Tariq. "An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities." EAI Endorsed Transactions on Smart Cities 7, no. 1 (2023): e5. http://dx.doi.org/10.4108/eetsc.v7i1.2845.
Full textAmit, Kore, Damania Kartik, Deshmukh Vaidehi, Jadhav Sneha, and Boruah Preeyonuj. "SECURITY ENHANCEMENT USING NEURAL NETWORKS FOR DATA TRANSMISSION." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 112–15. https://doi.org/10.5281/zenodo.1411792.
Full textSastry, Prof Executive Dean P. N. V. M., and Prof Dean Dr S. Vathsal. "Ultra High multi channel clock frequency(THz, PHz, EHz, ZHz,YHz,XHz,WHz) baud rate speed PRBS Transceiver HDL RTL ASIC Design for Ultra High long Distance Wireless Communication Engineering Smart Computing Products/ Applications." IOSR Journal of VLSI and Signal processing 14, no. 4 (2024): 18–26. http://dx.doi.org/10.9790/4200-14041826.
Full textZhu, Shenli, Xiaoheng Deng, Wendong Zhang, and Congxu Zhu. "Construction of a New 2D Hyperchaotic Map with Application in Efficient Pseudo-Random Number Generator Design and Color Image Encryption." Mathematics 11, no. 14 (2023): 3171. http://dx.doi.org/10.3390/math11143171.
Full textKlein, Netanel, Eyal Harel, and Itamar Levi. "The Cost of a True Random Bit—On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs." Cryptography 5, no. 3 (2021): 25. http://dx.doi.org/10.3390/cryptography5030025.
Full textMamun, Md Selim Al, and Fatema Akhter. "Pseudo Random Binary Sequence Based on Cyclic Difference Set." Symmetry 12, no. 8 (2020): 1202. http://dx.doi.org/10.3390/sym12081202.
Full textRivaldo, Rian, Handrizal Handrizal, and Herriyance Herriyance. "Pengamanan Pesan Menggunakan Metode MLSB PRNG dan Kompresi File dengan Algoritma RLE pada File Audio." JURNAL SISTEM INFORMASI BISNIS 11, no. 1 (2020): 1–8. http://dx.doi.org/10.21456/vol11iss1pp1-8.
Full textSimbolon, Buha Johannes. "Steganografi Penyisipan Pesan Pada File Citra Dengan Menggunakan Metode LSB (Least Significant Bit)." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 4, no. 1 (2021): 1–6. http://dx.doi.org/10.32672/jnkti.v4i1.2656.
Full textMaache, Ahmed, and Abdesattar Kalache. "Design and Implementation of a flexible Multi-purpose Cryptographic System on low cost FPGA." International journal of electrical and computer engineering systems 14, no. 1 (2023): 45–58. http://dx.doi.org/10.32985/ijeces.14.1.6.
Full textLurina, Manda, Sugondo Hadiyoso, and Rina Pudji Astuti. "Scrambling and De-Scrambling Implementation Using Linear Feedback Shift Register Method on FPGA." IJAIT (International Journal of Applied Information Technology) 1, no. 02 (2017): 59–67. http://dx.doi.org/10.25124/ijait.v1i02.876.
Full textNishitani, Yoshi, Chie Hosokawa, Yuko Mizuno-Matsumoto, Tomomitsu Miyoshi, Hajime Sawai, and Shinichi Tamura. "Detection of M-Sequences from Spike Sequence in Neuronal Networks." Computational Intelligence and Neuroscience 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/862579.
Full textCheng, Shuli, Liejun Wang, Naixiang Ao, and Qingqing Han. "A Selective Video Encryption Scheme Based on Coding Characteristics." Symmetry 12, no. 3 (2020): 332. http://dx.doi.org/10.3390/sym12030332.
Full textHsiu-Chi Tseng, Hsiu-Chi Tseng, and King-Chu Hung Hsiu-Chi Tseng. "Robust Zero-Watermarking by Circular Features and 1-D NRDPWT Transformation." 電腦學刊 35, no. 1 (2024): 109–29. http://dx.doi.org/10.53106/199115992024023501008.
Full textMisra, Shashank, Christopher R. Allemang, J. Darby Smith, Suma G. Cardwell, James B. Aimone, and Andrew D. Kent. "(Invited) There’s More to a Probabilistic Neuromorphic Computing System Than Noisy Devices." ECS Meeting Abstracts MA2024-01, no. 57 (2024): 3019. http://dx.doi.org/10.1149/ma2024-01573019mtgabs.
Full textPieprzyk, Josef, Marcin Pawłowski, Paweł Morawiecki, Arash Mahboubi, Jarek Duda, and Seyit Camtepe. "Pseudorandom bit generation with asymmetric numeral systems." International Journal of Information Security 24, no. 2 (2025). https://doi.org/10.1007/s10207-025-00995-4.
Full textNdaw, Babacar Alasane, Ousmane Ndiaye, Mamadou Sanghar´e, and Cheikh Thi´ecoumba Gueye. "A New Statistical Test for PRNG Based on the Attendance’s Law." Journal of Advances in Mathematics and Computer Science, March 10, 2021, 37–46. http://dx.doi.org/10.9734/jamcs/2021/v36i130328.
Full text"FPGA Hardware Co-Simulation of Image Encryption using Hybrid Chaotic Maps Based Stream Cipher." International Journal of Engineering and Advanced Technology 9, no. 4 (2020): 215–25. http://dx.doi.org/10.35940/ijeat.d6713.049420.
Full textNazish, Mir, Munika Javid, and M. Tariq Banday. "Enhanced logistic map with infinite chaos and its applicability in lightweight and high-speed pseudo-random bit generation." Cybersecurity 8, no. 1 (2025). https://doi.org/10.1186/s42400-024-00319-4.
Full text"FPGA Design of Encryption Speech system using Synchronized Fixed-Point Chaotic Maps Based Stream Ciphers." International Journal of Engineering and Advanced Technology 8, no. 6 (2019): 1534–41. http://dx.doi.org/10.35940/ijeat.f8156.088619.
Full textUsha, S., and M. Kanthimathi. "Design and Comparison of 24-bit Three Operand Adders using Parallel Prefix method for Efficient Computations." ICST Transactions on Scalable Information Systems, February 1, 2024. http://dx.doi.org/10.4108/eetsis.5004.
Full text"High – Speed and Low Area-Efficient VLSI Architecture of Three-Operand Binary Adder." Journal on Electronic and Automation Engineering 3, no. 2 (2024): 13–17. http://dx.doi.org/10.46632/jeae/3/2/02.
Full text"Minimizing Area and Maximizing Speed in Three-Operand Binary Adder Design." Journal on Electronic and Automation Engineering 4, no. 2 June 2025 (2025): 189–94. https://doi.org/10.46632/jeae/4/2/26.
Full textRyan, Conor, Meghana Kshirsagar, Gauri Vaidya, Andrew Cunningham, and R. Sivaraman. "Design of a cryptographically secure pseudo random number generator with grammatical evolution." Scientific Reports 12, no. 1 (2022). http://dx.doi.org/10.1038/s41598-022-11613-x.
Full textMoussa, Karim H., Shawki Shaaban, and Ahmed H. El-Sakka. "Secured polar code derived from random hopped frozen-bits." Wireless Networks, September 27, 2022. http://dx.doi.org/10.1007/s11276-022-03127-1.
Full textEid, Mahmoud M. A., Ahmed Nabih Zaki Rashed, Eman Mohsen El-gammal, Tahesin Samira Delwar, and Jee Youl Ryu. "The influence of electrical filters with sequence generators on optical ISL performance evolution with suitable data rates." Journal of Optical Communications, December 17, 2020. http://dx.doi.org/10.1515/joc-2020-0257.
Full textSukumaran, Ajitha. "Pseudo Random Bits Generation Using Chaotic Functions." Journal of Student Research, December 31, 2017. http://dx.doi.org/10.47611/jsr.vi.540.
Full textGupta, Mangal Deep, and R. K. Chauhan. "Hardware Efficient Pseudo-Random Number Generator using Chen Chaotic System on FPGA." Journal of Circuits, Systems and Computers, September 2, 2021, 2250043. http://dx.doi.org/10.1142/s0218126622500438.
Full textYu, Fei, Zinan Zhang, Hui Shen, et al. "Design and FPGA Implementation of a Pseudo-random Number Generator Based on a Hopfield Neural Network Under Electromagnetic Radiation." Frontiers in Physics 9 (June 4, 2021). http://dx.doi.org/10.3389/fphy.2021.690651.
Full textJohansson, Thomas, Willi Meier, and Vu Nguyen. "Attacks on the Firekite Cipher." IACR Transactions on Symmetric Cryptology, September 9, 2022, 191–216. http://dx.doi.org/10.46586/tosc.v2022.i3.191-216.
Full text