Trojan Attack on the Initialization of Pseudo-Random Bit Generators Using Synchronization of Chaotic Input Sources.
Michal MelosikWieslaw MarszalekPublished in: IEEE Access (2021)
Keyphrases
- pseudorandom
- random numbers
- secret key
- chaotic map
- encryption algorithm
- random number
- uniformly distributed
- pseudorandom number
- chaotic systems
- smart card
- chaotic neural network
- initial conditions
- block cipher
- databases
- authentication scheme
- cellular automata
- secret data
- information sources
- input data
- user specific
- public key
- multiple sources
- data sources
- k means