- Full text PDF available (1)
- This year (0)
- Last 5 years (4)
- Last 10 years (8)
In this paper, a new true random number generator (TRNG), based entirely on digital components is proposed. The design has been implemented using a fast random number generation method, which is dependent on a new type of ring oscillator with the ability to be set in metastable mode. Earlier methods of random number generation involved employment of jitter,… (More)
In this article we created the mathematical model of “client to server” communication including the compromised node probabilities and a number of possible routes having an admission to access points, also comparative characteristics of DoS/DDoS attacks in computer network has been provided herewith.
In this study, authors considered the information component of national security problem and its relevant to side-channel analysis (SCA). Main dangers of information security are shown. SCA is treated as one of the most dangerous types of attack which can influence on national security in general.
In this paper the application of statistical approach for anomaly detection in a wearable ECG monitor has been considered. The method is based on the usage of the pre-defined expected behavior of the monitored biomedical signal and its on-line comparison with real-time measurements. Such comparison can be implemented based on the statistical model of ECG… (More)
In this paper there is proposed an approach for seamless unlock security function for mobile application. The method combines the biomedical signals measured from human body and motion signals acquired from the devices. For this purpose a wearable device and a mobile device can be securely synchronized. It is shown that entropy extracted from biomedical ECG… (More)
In This work the problem of generating IP-core for quasi-random number generators (QRNG) based on Gollmann cascade has been considered. To solve this problem a software tool has been developed. It allows one to obtain the HDL-description files of QRNG, based on Gollmann cascade with different complexity levels. IP core technology is widely used as one of… (More)
The authors propose to use the so-called "Advanced Redundancy" technique to solve the DFA attack problem for modern crypt-devices. The basic of the proposed technique is the usage of McClusky idea about different realizations of redundancy units.
In this paper a method of elliptic curves (EC) parameters generating has been considered. The proposed method is based on the usage of Jacobi symbol and square remains. On the base of this method algorithms as well as software, which allow to effectively generate the EC coefficient have been developed. In the paper, the results of EC parameters generating… (More)