Academic literature on the topic 'Générateur de nombres pseudo-aléatoires'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Générateur de nombres pseudo-aléatoires.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Générateur de nombres pseudo-aléatoires"
Nuida, Koji. "Bounds of asymptotic occurrence rates of some patterns in binary words related to integer-valued logistic maps." Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AK,..., Proceedings (January 1, 2009). http://dx.doi.org/10.46298/dmtcs.2696.
Full textBaya, A. "Construction de générateurs de nombres aléatoires appropriés à l'algorithm ACPPA." Journal de la Recherche Scientifique de l'Universite de Lome 6, no. 1 (December 1, 2004). http://dx.doi.org/10.4314/jrsul.v6i1.17060.
Full textDissertations / Theses on the topic "Générateur de nombres pseudo-aléatoires"
Röck, Andrea. "Etudes quantitatives des générateurs de nombres (pseudo) aléatoires pour la cryptologie." Palaiseau, Ecole polytechnique, 2009. http://www.theses.fr/2009EPXX0014.
Full textRoeck, Andrea. "Quantifications de la génération de nombres pseudo-aléatoires en cryptographie." Phd thesis, Ecole Polytechnique X, 2009. http://tel.archives-ouvertes.fr/tel-00428553.
Full textFrançois, Michaël. "Génération de nombres pseudo-aléatoires basée sur des systèmes multi-physiques exotiques et chiffrement d'images." Troyes, 2012. http://www.theses.fr/2012TROY0023.
Full textThe use of (pseudo)-random numbers has taken an important dimension in recent decades. Many applications in the field of telecommunications, cryptography, numerical simulations or gambling, have contributed to the development and the use of these numbers. The methods used for the generation of (pseudo)- random numbers are based on two types of processes: physical and algorithmic. In this PhD thesis, two classes of generators based on the principles of physical measurements and mathematical processes are presented. For each class two generators are presented. The first class of generators operates the response of a physical system that serves as a source for the generation of random sequences. This class uses both simulation results and the results of interferometric measurements to produce sequences of random numbers. The second class of generators is based on two types of chaotic functions and uses the outputs of these functions as an index permutation on an initial vector. This PhD thesis also focuses on encryption systems for data protection. Two encryption algorithms using chaotic functions are proposed. These algorithms use a permutation-substitution process on the bits of the original image. A thorough analysis based on statistical tests confirms the relevance of the developped cryptosystems in this PhD thesis manuscript
Zapalowicz, Jean-Christophe. "Sécurité des générateurs pseudo-aléatoires et des implémentations de schémas de signature à clé publique." Thesis, Rennes 1, 2014. http://www.theses.fr/2014REN1S103/document.
Full textIn this thesis, we are interested in the security of pseudorandom number generators and of implementations of signature schemes. Regarding the signature schemes, we propose, in the case of a widespread implementation of RSA, various fault attacks which apply to any padding function. In addition we present a proven secure infective countermeasure to protect the RSA--PSS scheme against some non-random faults. Furthermore we study the ECDSA scheme coupled with the GLV/GLS speed-up techniques. Depending on the implementations, we prove either the good distribution of the used nonce, or that it has a bias, thereby enabling an attack. Finally we develop a tool for automatically finding fault attacks given an implementation and a fault policy, which is successfully applied to some RSA and ECDSA implementations. Regarding pseudorandom number generators, we study the nonlinear ones and improve some attacks by reducing the information available to the adversary. We also are interested in the security of the Micali-Schnorr generator through various attacks and a statistical study of its security assumption. Finally we propose a cryptanalysis of any public-key scheme based on the factorization or the discrete logarithm when the secret key is generated using a linear generator
Soucarros, Mathilde. "Analyse des générateurs de nombres aléatoires dans des conditions anormales d'utilisation." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00759976.
Full textBaya, Abalo. "Contribution à la génération de vecteurs aléatoires et à la cryptographie." Phd thesis, Grenoble 1, 1990. http://tel.archives-ouvertes.fr/tel-00336536.
Full textSantoro, Renaud. "Vers des générateurs de nombres aléatoires uniformes et gaussiens à très haut débit." Phd thesis, Université Rennes 1, 2009. http://tel.archives-ouvertes.fr/tel-00438600.
Full textAguilar, Angulo Julio Alexander. "Conception d'un générateur de valeurs aléatoires en technologie CMOS AMS 0.35µm." Thesis, Toulon, 2015. http://www.theses.fr/2015TOUL0012/document.
Full textRandom binary sequences generators constitute the essential part of a system Cryptographic. The speed, quality of generated suites, safety and consumption play an essential role in the selection of a generator. The security of the cryptographic system increases if such a system can be realized in a single circuit.The developed research work consists in the realization of a random number generator running in low power, low speed. The proposed circuit is analog and Valid all NIST tests ensuring the randomness of a signal.A realization on silicon in 0,35μm technology has been implemented and validated through NIST developed tests Matlab. In this thesis, a number of publications have demonstrated the added value search results
Bakiri, Mohammed. "Hardware implementation of a pseudo random number generator based on chaotic iteration." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD014/document.
Full textSecurity and cryptography are key elements in constrained devices such as IoT, smart card, embedded system, etc. Their hardware implementations represent a challenge in terms of limitations in physical resources, operating speed, memory capacity, etc. In this context, as most protocols rely on the security of a good random number generator, considered an indispensable element in lightweight security core. Therefore, this work proposes new pseudo-random generators based on chaotic iterations, and designed to be deployed on hardware support, namely FPGA or ASIC. These hardware implementations can be described as post-processing on existing generators. They transform a sequence of numbers not uniform into another sequence of numbers uniform. The dependency between input and output has been proven chaotic, according notably to the mathematical definitions of chaos provided by Devaney and Li-Yorke. Following that, we firstly elaborate or develop out a complete state of the art of the material and physical implementations of pseudo-random number generators (PRNG, for pseudorandom number generators). We then propose new generators based on chaotic iterations (IC) which will be tested on our hardware platform. The initial idea was to start from the n-cube (or, in an equivalent way, the vectorial negation in CIs), then remove a Hamiltonian cycle balanced enough to produce new functions to be iterated, for which is added permutation on output . The methods recommended to find good functions, will be detailed, and the whole will be implemented on our FPGA platform. The resulting generators generally have a better statistical profiles than its inputs, while operating at a high speed. Finally, we will implement them on many hardware support (65-nm ASIC circuit and Zynq FPGA platform)
Ben, Romdhane Molka. "Modélisation, implémentation et caractérisation de circuits générateurs de nombres aléatoires vrais pour la certification de crypto-processeurs." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0055/document.
Full textRandom numbers are required in numerous applications namely in cryptography where randomness is used in security protocols. There are two main classes of Random Number Generators (RNG) : The Pseudo RNG (PRNG) which have a deterministic sequence, and the True RNG (TRNG) which generates unpredictable random numbers. Cryptographic applications use both TRNG and PRNG. The PRNG needs an initial value, or seed, which can be the output of a TRNG. In digital technologies, like FPGAs, TRNG are commonly based on oscillators which have the drawback of being biased by harmonic coupling. In order to assess the entropic quality of TRNGs, standards based on statistical tests have been elaborated by certification organisms namely the NIST and the BSI. However, it is recommended to formalize the stochastic behaviour of the randomness generation process. In this Ph.D, we address the design and quality evaluation of TRNGs in digital circuits. We study of a low-cost digital TRNG without oscillators, hence robust against harmonics attacks. The proposed TRNG exploits both the metastability phenomenon and the jitter noise in CMOS digital flip-flops to generate the random numbers. A stochastic model of this TRNG has been formalized. This model describes the random generation process regardless of the targeted technology. The characterization and evaluation on a prototype circuit, in FPGA and ASIC technologies, has shown that the proposed TRNG architecture generates randomness of good quality and is robust against environmental variations
Books on the topic "Générateur de nombres pseudo-aléatoires"
Analytic methods in the analysis and design of number-theoretic algorithms. Cambridge, Mass: MIT Press, 1985.
Find full textRichard, Baker. Générateur de Nombres Aléatoires Officiel: Cadeaux Mathématiques. Independently Published, 2022.
Find full textBook chapters on the topic "Générateur de nombres pseudo-aléatoires"
Hill, David R. C. "Chapitre 23. Simulations stochastiques et calcul à haute performance : la « parallélisation » des générateurs de nombres pseudo-aléatoires." In Modéliser & simuler – Tome 2, 725. Editions Matériologiques, 2014. http://dx.doi.org/10.3917/edmat.varen.2014.01.0725.
Full text"Générateurs de nombres aléatoires." In Springer Undergraduate Texts in Mathematics and Technology, 247–70. New York, NY: Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-69213-5_8.
Full text"Production de nombres pseudo-aléatoires uniformes." In Hasard, nombres aléatoires et méthode Monte Carlo, 19–34. Presses de l'Université du Québec, 2001. http://dx.doi.org/10.2307/j.ctv18ph276.5.
Full text"Production de nombres pseudo-aléatoires obéissant à diverses lois de distribution." In Hasard, nombres aléatoires et méthode Monte Carlo, 35–72. Presses de l'Université du Québec, 2001. http://dx.doi.org/10.2307/j.ctv18ph276.6.
Full text