#### Filter Results:

- Full text PDF available (48)

#### Publication Year

2001

2016

- This year (0)
- Last 5 years (7)
- Last 10 years (28)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Viktor Fischer, Milos Drutarovský
- CHES
- 2001

This paper presents an evaluation of the Rijndael cipher, the Advanced Encryption Standard winner, from the viewpoint of its implementation in a Field Programmable Devices (FPD). Starting with an analysis of algorithm’s general characteristics a general cipher structure is described. Two different methods of Rijndael algorithm mapping to FPD are analyzed… (More)

- Viktor Fischer, Milos Drutarovský
- CHES
- 2002

This paper presents a new True Random Number Generator (TRNG) based on an analog Phase-Locked Loop (PLL) implemented in a digital Altera Field Programmable Logic Device (FPLD). Starting with an analysis of the one available on chip source of randomness the PLL synthesized low jitter clock signal, a new simple and reliable method of true randomness… (More)

- Viktor Fischer, Milos Drutarovský, Pawel Chodowiec, F. Gramain
- IEEE Trans. VLSI Syst.
- 2005

Hardware implementations of cryptography face increasingly more stringent demands for lower cost and greater computational power. In order to meet those demands more efficient approaches to implementations are needed. This paper presents detailed studies of MixColumn and InvMixColumn operations used in Advanced Encryption Standard with aim at their hardware… (More)

- Michal Varchola, Milos Drutarovský
- CHES
- 2010

We demonstrate a new high-entropy digital element suitable for True Random Number Generators (TRNGs) embedded in Field Programmable Gate Arrays (FPGAs). The original idea behind this principle lies in the randomness extraction on oscillatory trajectory when a bistable circuit is resolving a metastable event. Although such phenomenon is well known in the… (More)

- Jan Pelzl, Martin Šimka, +5 authors Viktor Fischer
- 2005

Since the introduction of public key cryptography, the problem of factoring large composites has been of increased interest. The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factoring large integers is the general number field sieve (GNFS). One important step… (More)

- Martin Simka, Jan Pelzl, +5 authors Viktor Fischer
- 13th Annual IEEE Symposium on Field-Programmable…
- 2005

The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is the general number field sieve (GNFS). Recently, architectures for special purpose hardware for the GNFS have been proposed. One important step within the GNFS is the factorization… (More)

- Rastislav Lukac, Viktor Fischer, Guy Motyl, Milos Drutarovský
- Int. J. Imaging Systems and Technology
- 2004

The paper presents a chaos-based True Random Number Generator (TRNG) implemented in commercially available mixed-signal PSoC reconfigurable devices without any external components. Contrary to the traditionally used sources of randomness (eg various ”well-behaved” analog noise sources) it uses well-defined deterministic analog circuit that exhibits chaos. A… (More)

- Milos Drutarovský, Martin Simka, Viktor Fischer, Frederic Celle
- Computers and Artificial Intelligence
- 2004

The paper presents a simple true random number generator (TRNG) which can be embedded in digital Application Specific Integrated Circuits (ASICs) and Field Programmable Logic Devices (FPLDs). As a source of randomness, it uses on-chip noise generated in the internal analog phaselocked loop (PLL) circuitry. In contrast with traditionally used free running… (More)

- Martin Simka, Milos Drutarovský, Viktor Fischer, J. Fayolle
- ISCAS
- 2006

The paper presents a simple stochastic model of a True Random Number Generator, which extracts randomness from the tracking jitter of a phase-locked loop. The existence of such a model is a necessary condition in the security certification process. The proposed model can be used to test, in real time, the proper behavior of the generator and thus to… (More)