year = "2008",
crossref = "DBLP:conf/seta/2008",
bibsource = "DBLP, http://dblp.uni-trier.de",
- ee = "http://dx.doi.org/10.1007/978-3-540-85912-3\\\\\\\\\\\_1"
+ ee = "http://dx.doi.org/10.1007/978-3-540-85912-3\\\\\\\\\\\\\_1"
+}
+
+@Article{ Zaher20113721,
+ title = "On the design of chaos-based secure communication systems",
+ journal = "Communications in Nonlinear Science and Numerical Simulation",
+ volume = "16",
+ number = "9",
+ pages = "3721--3737",
+ year = "2011",
+ note = "",
+ issn = "1007-5704",
+ doi = "10.1016/j.cnsns.2010.12.032",
+ url = "http://www.sciencedirect.com/science/article/pii/S1007570411000037",
+ author = "Ashraf A. Zaher and Abdulnasser Abu-Rezq",
+ keywords = "Chaos-based secure communication",
+ keywords1 = "Chaos synchronization",
+ keywords2 = "Cryptography",
+ keywords3 = "Parameter identification",
+ keywords4 = "Lyapunov functions"
+}
+
+@Article{ Wong200367,
+ title = "A chaotic cryptography scheme for generating short ciphertext",
+ journal = "Physics Letters A",
+ volume = "310",
+ number = "1",
+ pages = "67--73",
+ year = "2003",
+ note = "",
+ issn = "0375-9601",
+ doi = "10.1016/S0375-9601(03)00259-7",
+ url = "http://www.sciencedirect.com/science/article/pii/S0375960103002597",
+ author = "Kwok-Wo Wong and Sun-Wah Ho and Ching-Ki Yung",
+ keywords = "Chaos",
+ keywords1 = "Cryptography",
+ keywords2 = "Logistic map"
+}
+
+@Article{ Roland2001429,
+ title = "Use of chaotic dynamical systems in cryptography",
+ journal = "Journal of the Franklin Institute",
+ volume = "338",
+ number = "4",
+ pages = "429--441",
+ year = "2001",
+ note = "",
+ issn = "0016-0032",
+ doi = "10.1016/S0016-0032(00)00087-9",
+ url = "http://www.sciencedirect.com/science/article/pii/S0016003200000879",
+ author = "Roland and Schmitz",
+ keywords = "Cryptography",
+ keywords1 = "Chaos"
+}
+
+@Article{ MS199850,
+ title = "Cryptography with chaos",
+ journal = "Physics Letters A",
+ volume = "240",
+ number = "1-2",
+ pages = "50--54",
+ year = "1998",
+ note = "",
+ issn = "0375-9601",
+ doi = "10.1016/S0375-9601(98)00086-3",
+ url = "http://www.sciencedirect.com/science/article/pii/S0375960198000863",
+ author = "M.S. and Baptista",
+ keywords = "Chaos",
+ keywords1 = "Cryptography",
+ keywords2 = "Message",
+ keywords3 = "Security"
+}
+
+@Article{ DeMicco20083373,
+ title = "Randomizing nonlinear maps via symbolic dynamics",
+ journal = "Physica A: Statistical Mechanics and its Applications",
+ volume = "387",
+ number = "14",
+ pages = "3373--3383",
+ year = "2008",
+ note = "",
+ issn = "0378-4371",
+ doi = "10.1016/j.physa.2008.02.037",
+ url = "http://www.sciencedirect.com/science/article/pii/S0378437108002318",
+ author = "L. De Micco and C.M. Gonz{\'a}lez and H.A. Larrondo and M.T. Martin and A. Plastino and O.A. Rosso",
+ keywords = "Symbolic dynamics",
+ keywords1 = "Pseudo random number generators",
+ keywords2 = "Permutation entropy",
+ keywords3 = "Statistical complexity"
}
@Article{ Dyadkin1997258,
keywords2 = "Random number generators"
}
+@Article{ WT198429,
+ title = "The design of a truly random monolithic noise generator",
+ journal = "Microelectronics Journal",
+ volume = "15",
+ number = "4",
+ pages = "29--40",
+ year = "1984",
+ note = "",
+ issn = "0026-2692",
+ doi = "10.1016/S0026-2692(84)80068-3",
+ url = "http://www.sciencedirect.com/science/article/pii/S0026269284800683",
+ author = "W.T. and Penzhorn"
+}
+
@Article{ Vadim2011692,
title = "Pseudo-random number generators for Monte Carlo simulations on ATI Graphics Processing Units",
journal = "Computer Physics Communications",
@Misc{ Frick,
title = "The Frick Collection, http://www.frick.org/",
- comment = "http://www.frick.org/",
type = "web page",
- url = "http://www.frick.org/"
+ url = "http://www.frick.org/",
+ comment = "http://www.frick.org/"
}
@Misc{ Delicious,
title = "Delicious social bookmarking, http://delicious.com/",
- comment = "http://delicious.com/",
type = "web page",
- url = "http://delicious.com/"
+ url = "http://delicious.com/",
+ comment = "http://delicious.com/"
}
@Book{ ita09,
timestamp = "2010.02.05"
}
+@InBook{ Knuth1998_2,
+ title = "The Art of Computer Programming, Volume 2: Seminumerical Algorithms",
+ author = "D. E. Knuth",
+ editor = "Reading and Mass and {third edition}",
+ publisher = "Addison-Wesley",
+ year = "1998",
+ pages = "29",
+ chapter = "3",
+ volume = "2",
+ owner = "qianxue",
+ timestamp = "2010.02.05"
+}
+
+@InCollection{ tagkey2009407,
+ title = "Appendix E - Linear Feedback Shift Registers (LFSRs)",
+ editor = "",
+ booktitle = "Bebop to the Boolean Boogie (Third Edition)",
+ publisher = "Newnes",
+ edition = "Third Edition",
+ address = "Boston",
+ year = "2009",
+ pages = "407--422",
+ isbn = "978-1-85617-507-4",
+ doi = "10.1016/B978-1-85617-507-4.00033-4",
+ url = "http://www.sciencedirect.com/science/article/pii/B9781856175074000334",
+ key = "tagkey2009407",
+ author = "noname noname"
+}
+
+@Article{ Linardatos2002157,
+ title = "Synthesis of minimal cost nonlinear feedback shift registers",
+ journal = "Signal Processing",
+ volume = "82",
+ number = "2",
+ pages = "157--176",
+ year = "2002",
+ note = "",
+ issn = "0165-1684",
+ doi = "10.1016/S0165-1684(01)00172-4",
+ url = "http://www.sciencedirect.com/science/article/pii/S0165168401001724",
+ author = "D. Linardatos and N. Kalouptsidis",
+ keywords = "Nonlinear feedback shift registers",
+ keywords1 = "Berlekamp--Massey algorithm",
+ keywords2 = "FIA"
+}
+
+@Article{ Klapper199961,
+ title = "Algebraic feedback shift registers",
+ journal = "Theoretical Computer Science",
+ volume = "226",
+ number = "1-2",
+ pages = "61--92",
+ year = "1999",
+ note = "",
+ issn = "0304-3975",
+ doi = "10.1016/S0304-3975(99)00066-3",
+ url = "http://www.sciencedirect.com/science/article/pii/S0304397599000663",
+ author = "Andrew Klapper and Jinzhong Xu",
+ keywords = "Cryptography",
+ keywords1 = "Feedback shift register",
+ keywords2 = "Complete ring",
+ keywords3 = "Stream cipher",
+ keywords4 = "Pseudo-random number generator"
+}
+
+@Article{ Mykkeltveit1979202,
+ title = "On the cycle structure of some nonlinear shift register sequences",
+ journal = "Information and Control",
+ volume = "43",
+ number = "2",
+ pages = "202--215",
+ year = "1979",
+ note = "",
+ issn = "0019-9958",
+ doi = "10.1016/S0019-9958(79)90708-3",
+ url = "http://www.sciencedirect.com/science/article/pii/S0019995879907083",
+ author = "Johannes Mykkeltveit and Man-Keung Siu and Po Tong"
+}
+
+@Article{ Unjeng198461,
+ title = "On the cycle structure of certain classes of nonlinear shift registers",
+ journal = "Journal of Combinatorial Theory, Series A",
+ volume = "37",
+ number = "1",
+ pages = "61--68",
+ year = "1984",
+ note = "",
+ issn = "0097-3165",
+ doi = "10.1016/0097-3165(84)90019-0",
+ url = "http://www.sciencedirect.com/science/article/pii/0097316584900190",
+ author = "Unjeng and Cheng"
+}
+
+@Book{ Knuth1998_1,
+ title = "The Art of Computer Programming, Volume 2: Seminumerical Algorithms",
+ author = "D. E. Knuth",
+ editor = "Reading and Mass and {third edition}",
+ publisher = "Addison-Wesley",
+ year = "1997",
+ series = "Section 3.2.1: The Linear Congruential Method",
+ edition = "Third Edition",
+ volume = "2: Seminumerical Algorithms",
+ owner = "qianxue",
+ timestamp = "2010.02.05"
+}
+
@Article{ Gonzalez2005281,
title = "Statistical complexity measure of pseudorandom bit generators",
journal = "Physica A: Statistical Mechanics and its Applications",
}
@Article{ Djema2009,
- title = "Discrete time normal form for left invertibility problem
-",
+ title = "Discrete time normal form for left invertibility problem ",
author = "M. Djema and J.P. Barbot and I. Belmouhoub",
- journal = "European Journal of Control
-",
- pages = "194----204
-",
- volume = "15 (2)
-",
+ journal = "European Journal of Control ",
+ pages = "194----204 ",
+ volume = "15 (2) ",
year = "2009"
}
@Book{ Hao1993,
title = "Starting with parabolas: an introduction to chaotic dynamics",
author = "B. Hao",
- publisher = "Shanghai China: Shanghai Scientific and Technological
-Education Publishing House
-",
+ publisher = "Shanghai China: Shanghai Scientific and Technological Education Publishing House ",
year = "1993"
}
}
@Article{ Brown1996,
- title = "Clarifying chaos: examples and counterexamples
-",
- author = "R.
- Brown and LO.
- Chua",
+ title = "Clarifying chaos: examples and counterexamples ",
+ author = "R. Brown and LO. Chua",
journal = "International Journal of Bifurcation and Chaos",
pages = "219--249",
volume = "6",
year = "1996"
}
+@Book{ Deborah1998,
+ title = "Randomness",
+ author = "Deborah J. Bennett",
+ publisher = "Harvard University Press",
+ year = "1998"
+}
+
+@Book{ Kallenberg1986,
+ title = "Random Measures, 4th ed.",
+ author = "Olav Kallenberg",
+ publisher = "Academic Press",
+ address = "New York, London; Akademie-Verlag, Berlin,",
+ edition = "MR0854102",
+ year = "1986"
+}
+
+@Book{ William2007,
+ title = "Numerical Recipes: The Art of Scientific Computing (3rd ed.)",
+ series = "Chapter 7. Random Numbers",
+ author = "William H. Press",
+ publisher = "New York: Cambridge University Press",
+ year = "2007"
+}
+
+@InCollection{ Pashley2010184,
+ title = "Generating Random Numbers",
+ editor = "Editors-in-Chief: Penelope Peterson and Eva Baker and Barry McGaw",
+ booktitle = "International Encyclopedia of Education (Third Edition)",
+ publisher = "Elsevier",
+ edition = "Third Edition",
+ address = "Oxford",
+ year = "2010",
+ pages = "184--189",
+ isbn = "978-0-08-044894-7",
+ doi = "10.1016/B978-0-08-044894-7.01375-0",
+ url = "http://www.sciencedirect.com/science/article/pii/B9780080448947013750",
+ author = "P.J. Pashley and A. Amodeo",
+ keywords = "Composite generator",
+ keywords1 = "Deterministic generation",
+ keywords10 = "Shuffling",
+ keywords11 = "Simulation",
+ keywords12 = "Tests of randomness",
+ keywords13 = "Uniform variates",
+ keywords2 = "Generation efficiency",
+ keywords3 = "Multiplicative congruential generator",
+ keywords4 = "Physical generation",
+ keywords5 = "Portability",
+ keywords6 = "Random number generator",
+ keywords7 = "Random sequences",
+ keywords8 = "Reproducibility",
+ keywords9 = "Sequence period"
+}
+
+@Book{ Tippett1927,
+ title = "Random Sampling Numbers",
+ author = "L.H.C. Tippett",
+ publisher = "CUP",
+ year = "1927",
+ address = "London"
+}
+
+@Article{ Danger2009,
+ title = "High speed true random number generator based on open loop structures in FPGAs",
+ author = "J.-L. Danger and S. Guilley and P. Hoogvorst",
+ publisher = "Microelectronics Journal",
+ journal = "Microelectronics Journal",
+ pages = "1650--1656",
+ volume = "40",
+ number = "11",
+ year = "November 2009"
+}
+
+@Article{ JarosawAdam2011,
+ title = "Generating and using truly random quantum states in Mathematica",
+ journal = "Computer Physics Communications",
+ volume = "",
+ number = "0",
+ pages = "--",
+ year = "2011",
+ note = "",
+ issn = "0010-4655",
+ doi = "10.1016/j.cpc.2011.08.002",
+ url = "http://www.sciencedirect.com/science/article/pii/S0010465511002748",
+ author = "Jaros{\l}aw Adam and Miszczak",
+ keywords = "Random density matrices",
+ keywords1 = "Quantum information",
+ keywords2 = "Quantum random number generators"
+}
+
+@Article{ Tan20091618,
+ title = "Randomness quality of permuted pseudorandom binary sequences",
+ journal = "Mathematics and Computers in Simulation",
+ volume = "79",
+ number = "5",
+ pages = "1618--1626",
+ year = "2009",
+ note = "",
+ issn = "0378-4754",
+ doi = "10.1016/j.matcom.2008.07.012",
+ url = "http://www.sciencedirect.com/science/article/pii/S0378475408002486",
+ author = "Syn Kiat Tan and Sheng-Uei Guan",
+ keywords = "Pseudorandom number generation",
+ keywords1 = "DIEHARD testing",
+ keywords2 = "Linear finite state machine",
+ keywords3 = "Cellular automata"
+}
+
+@InCollection{ StDenis200691,
+ title = "Chapter 3 - Random Number Generation",
+ editor = "",
+ booktitle = "Cryptography for Developers",
+ publisher = "Syngress",
+ edition = "",
+ address = "Burlington",
+ year = "2006",
+ pages = "91--137",
+ isbn = "978-1-59749-104-4",
+ doi = "10.1016/B978-159749104-4/50006-6",
+ url = "http://www.sciencedirect.com/science/article/pii/B9781597491044500066",
+ author = "Tom St Denis and Simon Johnson"
+}
+
+@InBook{ Klapper1994,
+ title = "2-adic shift registers, in: R. Anderson (Ed.)
+, Fast Software Encryption",
+ author = "Klapper
+A. and Goresky
+M.",
+ publisher = "Lecture
+Notes in Computer Science
+",
+ pages = "174--178",
+ volume = "809",
+ year = "1994"
+}
+
+@Article{ DBLP1986,
+ author = "Lenore Blum and Manuel Blum and Mike Shub",
+ title = "A Simple Unpredictable Pseudo-Random Number Generator",
+ journal = "SIAM J. Comput.",
+ volume = "15",
+ number = "2",
+ year = "1986",
+ pages = "364--383",
+ bibsource = "DBLP, http://dblp.uni-trier.de",
+ ee = "http://dx.doi.org/10.1137/0215025"
+}
+
+@Book{ DBLP2003,
+ author = "Niels Ferguson and Bruce Schneier",
+ title = "Practical cryptography",
+ publisher = "Wiley",
+ year = "2003",
+ isbn = "978-0-471-22357-3",
+ pages = "I--XX, 1--410",
+ bibsource = "DBLP, http://dblp.uni-trier.de"
+}
+
+@Article{ Matsumoto1998,
+ author = "Makoto Matsumoto and Takuji Nishimura",
+ title = "Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator",
+ journal = "ACM Trans. Model. Comput. Simul.",
+ volume = "8",
+ month = "January",
+ year = "1998",
+ issn = "1049-3301",
+ pages = "3--30",
+ url = "http://doi.acm.org/10.1145/272991.272995",
+ doi = "http://doi.acm.org/10.1145/272991.272995",
+ publisher = "ACM",
+ address = "New York, NY, USA",
+ keywords = "finite fields, GFSR, incomplete array, inversive-decimation method, k-distribution, Mersenne primes, Mersenne twister, m-sequences, MT19937, multiple-recursive matrix method, primitive polynomials, random number generation, tempering, TGFSR",
+ acmid = "272995",
+ issue = "1",
+ numpages = "28"
+}
+
+@Book{ Miller2010,
+ author = "Frederic P. Miller and Agnes F. Vandome and John McBrewster",
+ title = "Cryptographically Secure Pseudorandom Number Generator",
+ year = "2010",
+ isbn = "6130875185, 9786130875183",
+ publisher = "Alpha Press"
+}
+
+@InCollection{ springerlink1994,
+ author = "Joan Daemen and Ren{\'e} Govaerts and Joos Vandewalle",
+ title = "Resynchronization Weaknesses in Synchronous Stream Ciphers",
+ booktitle = "Advances in Cryptology — EUROCRYPT ’93",
+ series = "Lecture Notes in Computer Science",
+ editor = "Tor Helleseth",
+ publisher = "Springer Berlin / Heidelberg",
+ isbn = "978-3-540-57600-6",
+ pages = "159--167",
+ volume = "765",
+ url = "http://dx.doi.org/10.1007/3-540-48285-7_14",
+ note = "10.1007/3-540-48285-7\_14",
+ year = "1994",
+ affiliation = "Katholieke Universiteit Leuven Laboratorium ESAT Kardinaal Mercierlaan 94 B-3001 Heverlee Belgium",
+ keyword = "Computer Science"
+}
+
+@Article{ PhysRevA2004,
+ title = "Secure direct communication with a quantum one-time pad",
+ month = "May",
+ journal = "Phys. Rev. A",
+ doi = "10.1103/PhysRevA.69.052319",
+ author = "Fu-Guo Deng and Gui Lu Long",
+ year = "2004",
+ url = "http://link.aps.org/doi/10.1103/PhysRevA.69.052319",
+ publisher = "American Physical Society",
+ pages = "052319",
+ volume = "69",
+ issue = "5",
+ numpages = "4"
+}
+
+@InProceedings{ Wu2008,
+ author = "Keke Wu and Huiyun Li and Bo Peng and Fengqi Yu",
+ title = "Correlation Power Analysis Attack against Synchronous Stream Ciphers",
+ booktitle = "Proceedings of the 2008 The 9th International Conference for Young Computer Scientists",
+ year = "2008",
+ isbn = "978-0-7695-3398-8",
+ pages = "2067--2072",
+ numpages = "6",
+ url = "http://dl.acm.org/citation.cfm?id=1491263.1492074",
+ doi = "10.1109/ICYCS.2008.8",
+ acmid = "1492074",
+ publisher = "IEEE Computer Society",
+ address = "Washington, DC, USA",
+ keywords = "Correlation coefficient, CPA, DPA, Synchronous stream ciphers, Side channel analysis"
+}
+
+@InProceedings{ Daemen1994,
+ author = "Joan Daemen and Ren{\'e} Govaerts and Joos Vandewalle",
+ title = "Resynchronization weaknesses in synchronous stream ciphers",
+ booktitle = "Workshop on the theory and application of cryptographic techniques on Advances in cryptology",
+ series = "EUROCRYPT '93",
+ year = "1994",
+ isbn = "3-540-57600-2",
+ location = "Lofthus, Norway",
+ pages = "159--167",
+ url = "http://dl.acm.org/citation.cfm?id=188307.188337",
+ publisher = "Springer-Verlag New York, Inc.",
+ address = "Secaucus, NJ, USA",
+ acmid = "188337",
+ numpages = "9"
+}
+
+@Book{ cusick2004stream,
+ title = "Stream ciphers and number theory",
+ author = "T.W. Cusick and C. Ding and A. Renvall",
+ isbn = "9780444516312",
+ series = "North-Holland mathematical library",
+ url = "http://books.google.com/books?id=Q2IncJ99wacC",
+ year = "2004",
+ publisher = "Elsevier",
+ lccn = "2004040484"
+}
+
+@Book{ Meyer100035,
+ author = "Carl H Meyer and Stephen M Matyas",
+ title = "Cryptography: a new dimension in computer data security; a guide for the design and implementation of secure systems",
+ publisher = "Wiley",
+ address = "New York, NY",
+ year = "1982"
+}
+
+@Book{ schneier1996applied,
+ title = "Applied cryptography: protocols, algorithms, and source code in C",
+ author = "B. Schneier",
+ isbn = "9780471128458",
+ url = "http://books.google.com/books?id=6NdQAAAAMAAJ",
+ year = "1996",
+ publisher = "Wiley",
+ lccn = "95012398"
+}
+
+@Article{ STMAZ.01769371,
+ author = "Toni Stojanovski and Johnny Pihl and Ljup\u{c}o Kocarev",
+ title = "Chaos-based random number generators.",
+ year = "2001",
+ journal = "IEEE Transactions on Circuits and Systems. I: Fundamental Theory and Applications",
+ volume = "48",
+ number = "3",
+ issn = "1057-7122",
+ pages = "382--385",
+ publisher = "Institute of Electrical and Electronics Engineers, Inc., New York, NY",
+ doi = "10.1109/81.915396",
+ abstract = "Summary: This paper and its companion [Part I, {\it T. Stojanovski} and {\it L. M. Kocarev}, ibid. 48, No. 3, 281-288 (2001; reviewed above)] are devoted to the analysis of the application of a chaotic piecewise-linear one-dimensional (PL1D) map as random number generator (RNG). In Part I, we have mathematically analyzed the information generation process of a class of PL1D maps. In this paper, we find optimum parameters that give an RNG with lowest redundancy and maximum margin against parasitic attractors. Further, the map is implemented in a 0.8 $\mu$m standard CMOS process utilizing switched current techniques. Post-layout circuit simulations of the RNG indicate no periodic attractors over variations in temperature, power supply and process conditions, and maximum redundancy of $0.4\%$. We estimate that the output bit rate of our RNG is 1 Mbit/s, which is substantially higher than the output bit rate of RNGs available on the market.",
+ identifier = "0997.65003",
+ msc2010 = "65C10 (94C05 62P20 94A15 62B10)"
+}
+