- Full text PDF available (1)
In this paper, a new true random number generator (TRNG), based entirely on digital components is proposed. The design has been implemented using a fast random number generation method, which is dependent on a new type of ring oscillator with the ability to be set in metastable mode. Earlier methods of random number generation involved employment of jitter,… (More)
In this study, authors considered the information component of national security problem and its relevant to side-channel analysis (SCA). Main dangers of information security are shown. SCA is treated as one of the most dangerous types of attack which can influence on national security in general.
In this article we created the mathematical model of “client to server” communication including the compromised node probabilities and a number of possible routes having an admission to access points, also comparative characteristics of DoS/DDoS attacks in computer network has been provided herewith.
In this paper the application of statistical approach for anomaly detection in a wearable ECG monitor has been considered. The method is based on the usage of the pre-defined expected behavior of the monitored biomedical signal and its on-line comparison with real-time measurements. Such comparison can be implemented based on the statistical model of ECG… (More)
In This work the problem of generating IP-core for quasi-random number generators (QRNG) based on Gollmann cascade has been considered. To solve this problem a software tool has been developed. It allows one to obtain the HDL-description files of QRNG, based on Gollmann cascade with different complexity levels. IP core technology is widely used as one of… (More)
In this paper there is proposed an approach for seamless unlock security function for mobile application. The method combines the biomedical signals measured from human body and motion signals acquired from the devices. For this purpose a wearable device and a mobile device can be securely synchronized. It is shown that entropy extracted from biomedical ECG… (More)
The authors propose to use the so-called "Advanced Redundancy" technique to solve the DFA attack problem for modern crypt-devices. The basic of the proposed technique is the usage of McClusky idea about different realizations of redundancy units.