2019
DOI: 10.3906/elk-1806-167
|View full text |Cite
|
Sign up to set email alerts
|

A new computer-controlled platform for ADC-based true random number generator and its applications

Abstract: The basis of encryption techniques is random number generators (RNGs). The application areas of cryptology are increasing in number due to continuously developing technology, so the need for RNGs is increasing rapidly, too. RNGs can be divided into two categories as pseudorandom number generator (PRNGs) and true random number generator (TRNGs). TRNGs are systems that use unpredictable and uncontrollable entropy sources and generate random numbers. During the design of TRNGs, while analog signals belonging to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 36 publications
0
3
0
1
Order By: Relevance
“…The x,y, and z time series results obtained through the program are saved as output in Microsoft Excel format to be converted into chaotic velocity data. The X time series results shown in Figure 15 are saved in ".txt" format and copied to the SD card in the PLC [23][24][25][26][27][28][29][30][31][32][33][34][35][36]. The chaotic system where the ball mill wants to be operated is selected among three different chaotic systems with the buttons on the "Chaotic Settings" screen shown in Figure 16.…”
Section: Figure 14 "Lorenz" Subroutinementioning
confidence: 99%
See 2 more Smart Citations
“…The x,y, and z time series results obtained through the program are saved as output in Microsoft Excel format to be converted into chaotic velocity data. The X time series results shown in Figure 15 are saved in ".txt" format and copied to the SD card in the PLC [23][24][25][26][27][28][29][30][31][32][33][34][35][36]. The chaotic system where the ball mill wants to be operated is selected among three different chaotic systems with the buttons on the "Chaotic Settings" screen shown in Figure 16.…”
Section: Figure 14 "Lorenz" Subroutinementioning
confidence: 99%
“…In recent years, its use has been increasing in many fields, such as chaos theory, communication security [31], cryptology [32], industry [23], weather forecasts [33] and random number generators [34]. Chaos theory aims to explain the underlying order in seemingly random patterns, focusing on understanding systems that contain uncertainty and disorder.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Önemli verileri gizlemek, başkaları tarafından anlaşılamayacak bir forma sokmak için günümüzde birçok farklı teknik kullanılmaktadır. Şifreleme işlemi yapılırken genelden mantıksal elemanlardan ve matematiksel işlemlerden faydalanılarak oluşturulan bir model kullanılır [1]. Birçok sistem şifreleme işlemi için anahtar diye tabir edilen bir değer kullanır.…”
Section: Introductionunclassified