Showing 41 - 60 results of 90 for search '"NIST"', query time: 0.04s Refine Results
  1. 41

    Energy Conservation, Singular Orbits, and FPGA Implementation of Two New Hamiltonian Chaotic Systems by Enzeng Dong, Guanghan Liu, Zenghui Wang, Zengqiang Chen

    Published 2020-01-01
    “…Furthermore, a pseudorandom signal generator is developed based on these proposed systems, which are tested based on NIST tests and implemented by using the field programmable gate array (FPGA) technique.…”
    Get full text
    Article
  2. 42

    Controllability design of a memristive hyperchaotic map and the construction of optical fiber secure communication system by LI Chunbiao, LI Yongxin, ZHONG Qing, YANG Yong, AKGUL Akif

    Published 2024-04-01
    “…Based on the RISC-V microcontroller of CH32V307, the proposed controllable hyperchaotic map was realized, and National Institute of Standards and Technology (NIST) testing proves the pseudo-random feature of hyperchaotic sequences. …”
    Get full text
    Article
  3. 43

    ECC fault attack algorithm based on Grover's quantum search algorithm with 0.1π phase rotation by Chao WANG, Lin CAO, Hui-hui JIA, Feng HU

    Published 2017-08-01
    “…The Grover's a1gorithm was used for fau1t attack against the pub1ic key cryptography.A fixed phase rotation based Grover's a1gorithm was proposed,and the probabi1ity of success achieved 99.23% with 0.1π phase rotation.Combined with the fau1t attack further,ECC(e11iptic curve cryptography)vo1tage burr attack a1gorithm based on Grover a1gorithm with 0.1π phase rotation was proposed.Then a safety Kob1itz curve,K-163,pub1ished successfu11y attacked by NIST on binary domain in simu1ation and the success rate was 100%.The comp1exity of the attack great1y reduces on the exponentia1.It was a new effective way,except the Shor's a1gorithm,to attack pub1ic key cryptography by quantum computing,and it contributed to extend the attack ways to the other pub1ic key cryptography.…”
    Get full text
    Article
  4. 44

    Direct Analysis of Low-Volatile Molecular Marker Extract from Airborne Particulate Matter Using Sensitivity Correction Method by Satoshi Irei

    Published 2016-01-01
    “…The method was further validated for the PAHs using the NIST standard reference materials (SRMs) and then applied to airborne particulate matter samples. …”
    Get full text
    Article
  5. 45

    Mitigating Cyber Risks in AI-Driven Circular Economy Implementations by Iryna Bashynska, Olha Prokopenko

    Published 2024-12-01
    “…The research underscores the importance of adopting robust cybersecurity frameworks, such as the NIST AI Risk Management Framework and ISO/IEC 27001, to mitigate these risks and ensure the scalability and sustainability of AI-driven CE initiatives. …”
    Get full text
    Article
  6. 46

    Enhancing fingerprint identification using Fuzzy-ANN minutiae matching by S.P. Singh, Dinesh Kumar Nishad, Saifullah Khalid

    Published 2025-02-01
    “…Implemented in MATLAB, the system performs remarkably on benchmark datasets like FVC2004 DB1 and NIST SD27, achieving state-of-the-art results. This paper not only presents a detailed methodology involving image enhancement, minutiae extraction, and advanced matching techniques but also sets a new standard in fingerprint identification technology, particularly in handling altered fingerprints effectively.…”
    Get full text
    Article
  7. 47

    High-Density Physical Random Number Generator Using Spin Signals in Multidomain Ferromagnetic Layer by Sungwoo Chun, Seung-Beck Lee, Masahiko Hara, Wanjun Park, Song-Ju Kim

    Published 2015-01-01
    “…The randomness of the bit sequences generated by the proposed RNG is verified using the FIPS 140-2 statistical test suite provided by the NIST. The test results validate the effectiveness of the proposed RNGs. …”
    Get full text
    Article
  8. 48
  9. 49

    CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm by YANG Yatao, CHANG Xin, SHI Haopeng, WANG Wei, WANG Ke

    Published 2024-07-01
    “…The scheme was based on the post-quantum digital signature algorithm CRYSTALS-Dilithium, selected by national institute of standards and technology (NIST). The overall scheme adopted the Fiat-Shamir signature structure, which comprised five stages, such as key generation, blinding, signing, unblinding and verification. …”
    Get full text
    Article
  10. 50

    Microwave-Assisted Digestion Using Dilute Nitric Acid and Hydrogen Peroxide for Multielement Determination in Wheat Flour by ICP-MS by Ibrahim A. Alhagri, Mosa Albeshry

    Published 2023-01-01
    “…The analytical method was validated, and the accuracy of the method was then evaluated through analysis of wheat flour-certified standard reference materials (NIST SRM 1567b). The validated procedure was subsequently applied to the analysis of 12 wheat samples sourced from local farms in the Al-Qassim region and a further six samples purchased from the Al-Qassim markets, covering six imported brands common in Saudi Arabia. …”
    Get full text
    Article
  11. 51

    Speedup signing: pre-rejection sampling towards dilithium by Lianglin Yan, Ming Luo, Mingsheng Wang

    Published 2025-02-01
    “…The experimental results show that pre-rejection sampling achieves a $$47\%$$ 47 % , $$22\%$$ 22 % , and $$17\%$$ 17 % reduction in the rejection probability of the fourth condition over Dilithium scheme when the parameter set corresponds to NIST’s security levels 2, 3 and 5, respectively. This type of reduction increases signing speed by approximately $$1\%$$ 1 % under the parameter set 2 of Dilithium.…”
    Get full text
    Article
  12. 52

    Jerk forms dynamics of a Chua’s family and their new unified circuit implementation by Wei Xu, Ning Cao

    Published 2021-11-01
    “…According to the complexity and National Institute of Standards and Technology (NIST) test results, the pseudo‐random performance of the chaotic sequence brought by the Jerk forms of the Chua system is better. …”
    Get full text
    Article
  13. 53
  14. 54

    Design and Implementation of Multiple Ring Oscillator-Based TRNG Architecture by Using ADPLL by Huirem Bharat Meitei, Manoj Kumar

    Published 2025-01-01
    “…Energy consumption per bit of the generated bitstream is in the range of 4.22 nJ/bit-5.85 nJ/bit, and throughput values are in the range of 206.82 Mbps-260.07 Mbps. The NIST SP 800-22 test is conducted to validate the randomness of the generated bit stream outputs from the post-processing circuit.…”
    Get full text
    Article
  15. 55
  16. 56
  17. 57

    GAN-based pseudo random number generation optimized through genetic algorithms by Xuguang Wu, Yiliang Han, Minqing Zhang, Yu Li, Su Cui

    Published 2024-11-01
    “…The proposed PRNG has been rigorously tested using stringent benchmarks such as the NIST Statistical Test Suite (SP800-22) and the Chinese standard for random number generation (GM/T 0005-2021). …”
    Get full text
    Article
  18. 58

    A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. by Ye Tao, Wenhua Cui, Shanshan Wang, Yayun Wang

    Published 2025-01-01
    “…The randomness of these two chaotic mappings was verified through Lyapunov index and NIST SP 800-22 randomness tests. Thirdly, the encryption process is carried out according to the shape of a traditional Chinese fan, and the diffusion and scrambling of each pixel of the image are performed in parallel. …”
    Get full text
    Article
  19. 59

    A Post-Processing Method for Quantum Random Number Generator Based on Zero-Phase Component Analysis Whitening by Longju Liu, Jie Yang, Mei Wu, Jinlu Liu, Wei Huang, Yang Li, Bingjie Xu

    Published 2025-01-01
    “…Furthermore, the randomness extraction is performed after ZCA whitening, after which the final random bits can pass the NIST test.…”
    Get full text
    Article
  20. 60

    Copula-Driven Learning Techniques for Physical Layer Authentication Using Multimodal Data by Sahana Srikanth, Sanjeev Gurugopinath, Sami Muhaidat

    Published 2025-01-01
    “…In particular, we consider three datasets which include a Monte Carlo simulations-based synthetic dataset, and publicly available automotive factory (AF) and open area test site (OATS) datasets from National institute of standards and technology (NIST). A comparative performance study of the proposed architectures across the datasets is carried out in terms of detection accuracy. …”
    Get full text
    Article