The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in many security related applications and protocols. This PRNG is written as an open source code which is subject to regular changes. It was last analyzed in the work of Gutterman et al. in 2006 [GPR06] but since then no new analysis has been made available,… (More)
A corrector is used to reduce or eliminate statistical weakness of a physical random number generator. A description of linear corrector generalizing post-processing described by M. Dichtl at FSE'07  is introduced. A general formula for non linear corrector, determining the bias and the minimal entropy of the output of a function is given. Finally, a… (More)
A post-processing function is used to reduce or eliminate statistical weaknesses of physical random number generators. The output bias of a n-bit input m-bit output function is examined, when the input bits are biased. For this purpose, the definition of (n, m, t)-corrector is introduced; many characterizations and properties of a corrector are presented.… (More)
Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying privacy and… (More)
This poster proposes a secure e-payment architecture for on-line shopping protecting users' privacy. Introduction. Online shopping is becoming more and more interesting for customers because of the ease of use and the large choice of products. A vast amount of sensitive information is transferred during such online payment transactions what involves privacy… (More)
E-health information systems give rise to many security and privacy concerns. Security of these systems involves a large amount of sensitive data shared by several actors, such as doctors or nurses in various institutions. However, the privacy preserving issue, including data minimization and data sovereignty, is not necessary treated. This paper presents… (More)
Generation of pseudo-random binary sequences by one-dimensional cellular automata is surveyed using both uniform and hybrid automata. The updating function is a Boolean function that must satisfy criteria of resilience and nonlinearity for the sequence they generate to be secure for a stream cipher application.