Literatura científica selecionada sobre o tema "Générateur de nombres pseudo-aléatoires"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Générateur de nombres pseudo-aléatoires".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Générateur de nombres pseudo-aléatoires"
Nuida, Koji. "Bounds of asymptotic occurrence rates of some patterns in binary words related to integer-valued logistic maps". Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AK,..., Proceedings (1 de janeiro de 2009). http://dx.doi.org/10.46298/dmtcs.2696.
Texto completo da fonteBaya, A. "Construction de générateurs de nombres aléatoires appropriés à l'algorithm ACPPA". Journal de la Recherche Scientifique de l'Universite de Lome 6, n.º 1 (1 de dezembro de 2004). http://dx.doi.org/10.4314/jrsul.v6i1.17060.
Texto completo da fonteTeses / dissertações sobre o assunto "Générateur de nombres pseudo-aléatoires"
Röck, Andrea. "Etudes quantitatives des générateurs de nombres (pseudo) aléatoires pour la cryptologie". Palaiseau, Ecole polytechnique, 2009. http://www.theses.fr/2009EPXX0014.
Texto completo da fonteRoeck, Andrea. "Quantifications de la génération de nombres pseudo-aléatoires en cryptographie". Phd thesis, Ecole Polytechnique X, 2009. http://tel.archives-ouvertes.fr/tel-00428553.
Texto completo da fonteFrançois, Michaël. "Génération de nombres pseudo-aléatoires basée sur des systèmes multi-physiques exotiques et chiffrement d'images". Troyes, 2012. http://www.theses.fr/2012TROY0023.
Texto completo da fonteThe use of (pseudo)-random numbers has taken an important dimension in recent decades. Many applications in the field of telecommunications, cryptography, numerical simulations or gambling, have contributed to the development and the use of these numbers. The methods used for the generation of (pseudo)- random numbers are based on two types of processes: physical and algorithmic. In this PhD thesis, two classes of generators based on the principles of physical measurements and mathematical processes are presented. For each class two generators are presented. The first class of generators operates the response of a physical system that serves as a source for the generation of random sequences. This class uses both simulation results and the results of interferometric measurements to produce sequences of random numbers. The second class of generators is based on two types of chaotic functions and uses the outputs of these functions as an index permutation on an initial vector. This PhD thesis also focuses on encryption systems for data protection. Two encryption algorithms using chaotic functions are proposed. These algorithms use a permutation-substitution process on the bits of the original image. A thorough analysis based on statistical tests confirms the relevance of the developped cryptosystems in this PhD thesis manuscript
Zapalowicz, Jean-Christophe. "Sécurité des générateurs pseudo-aléatoires et des implémentations de schémas de signature à clé publique". Thesis, Rennes 1, 2014. http://www.theses.fr/2014REN1S103/document.
Texto completo da fonteIn this thesis, we are interested in the security of pseudorandom number generators and of implementations of signature schemes. Regarding the signature schemes, we propose, in the case of a widespread implementation of RSA, various fault attacks which apply to any padding function. In addition we present a proven secure infective countermeasure to protect the RSA--PSS scheme against some non-random faults. Furthermore we study the ECDSA scheme coupled with the GLV/GLS speed-up techniques. Depending on the implementations, we prove either the good distribution of the used nonce, or that it has a bias, thereby enabling an attack. Finally we develop a tool for automatically finding fault attacks given an implementation and a fault policy, which is successfully applied to some RSA and ECDSA implementations. Regarding pseudorandom number generators, we study the nonlinear ones and improve some attacks by reducing the information available to the adversary. We also are interested in the security of the Micali-Schnorr generator through various attacks and a statistical study of its security assumption. Finally we propose a cryptanalysis of any public-key scheme based on the factorization or the discrete logarithm when the secret key is generated using a linear generator
Soucarros, Mathilde. "Analyse des générateurs de nombres aléatoires dans des conditions anormales d'utilisation". Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00759976.
Texto completo da fonteBaya, Abalo. "Contribution à la génération de vecteurs aléatoires et à la cryptographie". Phd thesis, Grenoble 1, 1990. http://tel.archives-ouvertes.fr/tel-00336536.
Texto completo da fonteSantoro, Renaud. "Vers des générateurs de nombres aléatoires uniformes et gaussiens à très haut débit". Phd thesis, Université Rennes 1, 2009. http://tel.archives-ouvertes.fr/tel-00438600.
Texto completo da fonteAguilar, Angulo Julio Alexander. "Conception d'un générateur de valeurs aléatoires en technologie CMOS AMS 0.35µm". Thesis, Toulon, 2015. http://www.theses.fr/2015TOUL0012/document.
Texto completo da fonteRandom binary sequences generators constitute the essential part of a system Cryptographic. The speed, quality of generated suites, safety and consumption play an essential role in the selection of a generator. The security of the cryptographic system increases if such a system can be realized in a single circuit.The developed research work consists in the realization of a random number generator running in low power, low speed. The proposed circuit is analog and Valid all NIST tests ensuring the randomness of a signal.A realization on silicon in 0,35μm technology has been implemented and validated through NIST developed tests Matlab. In this thesis, a number of publications have demonstrated the added value search results
Bakiri, Mohammed. "Hardware implementation of a pseudo random number generator based on chaotic iteration". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD014/document.
Texto completo da fonteSecurity and cryptography are key elements in constrained devices such as IoT, smart card, embedded system, etc. Their hardware implementations represent a challenge in terms of limitations in physical resources, operating speed, memory capacity, etc. In this context, as most protocols rely on the security of a good random number generator, considered an indispensable element in lightweight security core. Therefore, this work proposes new pseudo-random generators based on chaotic iterations, and designed to be deployed on hardware support, namely FPGA or ASIC. These hardware implementations can be described as post-processing on existing generators. They transform a sequence of numbers not uniform into another sequence of numbers uniform. The dependency between input and output has been proven chaotic, according notably to the mathematical definitions of chaos provided by Devaney and Li-Yorke. Following that, we firstly elaborate or develop out a complete state of the art of the material and physical implementations of pseudo-random number generators (PRNG, for pseudorandom number generators). We then propose new generators based on chaotic iterations (IC) which will be tested on our hardware platform. The initial idea was to start from the n-cube (or, in an equivalent way, the vectorial negation in CIs), then remove a Hamiltonian cycle balanced enough to produce new functions to be iterated, for which is added permutation on output . The methods recommended to find good functions, will be detailed, and the whole will be implemented on our FPGA platform. The resulting generators generally have a better statistical profiles than its inputs, while operating at a high speed. Finally, we will implement them on many hardware support (65-nm ASIC circuit and Zynq FPGA platform)
Ben, Romdhane Molka. "Modélisation, implémentation et caractérisation de circuits générateurs de nombres aléatoires vrais pour la certification de crypto-processeurs". Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0055/document.
Texto completo da fonteRandom numbers are required in numerous applications namely in cryptography where randomness is used in security protocols. There are two main classes of Random Number Generators (RNG) : The Pseudo RNG (PRNG) which have a deterministic sequence, and the True RNG (TRNG) which generates unpredictable random numbers. Cryptographic applications use both TRNG and PRNG. The PRNG needs an initial value, or seed, which can be the output of a TRNG. In digital technologies, like FPGAs, TRNG are commonly based on oscillators which have the drawback of being biased by harmonic coupling. In order to assess the entropic quality of TRNGs, standards based on statistical tests have been elaborated by certification organisms namely the NIST and the BSI. However, it is recommended to formalize the stochastic behaviour of the randomness generation process. In this Ph.D, we address the design and quality evaluation of TRNGs in digital circuits. We study of a low-cost digital TRNG without oscillators, hence robust against harmonics attacks. The proposed TRNG exploits both the metastability phenomenon and the jitter noise in CMOS digital flip-flops to generate the random numbers. A stochastic model of this TRNG has been formalized. This model describes the random generation process regardless of the targeted technology. The characterization and evaluation on a prototype circuit, in FPGA and ASIC technologies, has shown that the proposed TRNG architecture generates randomness of good quality and is robust against environmental variations
Livros sobre o assunto "Générateur de nombres pseudo-aléatoires"
Analytic methods in the analysis and design of number-theoretic algorithms. Cambridge, Mass: MIT Press, 1985.
Encontre o texto completo da fonteRichard, Baker. Générateur de Nombres Aléatoires Officiel: Cadeaux Mathématiques. Independently Published, 2022.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Générateur de nombres pseudo-aléatoires"
Hill, David R. C. "Chapitre 23. Simulations stochastiques et calcul à haute performance : la « parallélisation » des générateurs de nombres pseudo-aléatoires". In Modéliser & simuler – Tome 2, 725. Editions Matériologiques, 2014. http://dx.doi.org/10.3917/edmat.varen.2014.01.0725.
Texto completo da fonte"Générateurs de nombres aléatoires". In Springer Undergraduate Texts in Mathematics and Technology, 247–70. New York, NY: Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-69213-5_8.
Texto completo da fonte"Production de nombres pseudo-aléatoires uniformes". In Hasard, nombres aléatoires et méthode Monte Carlo, 19–34. Presses de l'Université du Québec, 2001. http://dx.doi.org/10.2307/j.ctv18ph276.5.
Texto completo da fonte"Production de nombres pseudo-aléatoires obéissant à diverses lois de distribution". In Hasard, nombres aléatoires et méthode Monte Carlo, 35–72. Presses de l'Université du Québec, 2001. http://dx.doi.org/10.2307/j.ctv18ph276.6.
Texto completo da fonte