FPGA Implementations of Tiny Mersenne Twister
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 9
Abstract
Random number generators are essential in many computing applications, such as Artificial Intelligence like genetic algorithms and automated opponents, random game content, simulation of complex phenomena such as weather and fire, numerical methods such as Monte-Carlo integration, cryptography algorithms such as RSA use random numbers for key generation, digital signal processing and communications, etc. Pseudo-random Number Generators (PRNGs) generate a sequence of “random” numbers using an algorithm, operating on an internal state, such as Linear Congruential Generator, Truncated Linear Congruential Generator, Linear Feedback Shift Register, Inversive Congruential Generator, Lagged Fibonacci Generator, Cellular Automata, Mersenne Twister, etc. The Mersenne Twister method, which avoided many of the problems with earlier generators and widely used in many applications, was proposed in 1998. In 2011, a tiny version of Mersenne Twister (TinyMT) was proposed. In some applications for example, where the large state size (19937 bits) of Mersenne Twister may be an obstruction for implementation. TinyMT is designed for such situation, with small state size and good randomness for that size of internal state. In this paper, FPGA implementations of four different TinyMT architectures were proposed and realized on Xilinx Virtex-4 FPGAs for the first time. The proposed designs can achieve very high throughput but with relatively very small areas.
Authors and Affiliations
Guoping Wang
INHIBITION OF E.CANCEROGENUS MAB-1 β -LACTAMASE BY SYNERGISTIC FORMULATION: AN IN VITRO HERBAL SHOTGUN STUDY
β-lactamases are increasing worldwide speedily by creating problem to currently available UTI therapies and hence there is an urgent need of research to find the effective therapy. In the present study we propose to deve...
A Survey on Web Crawling Techniques by Emphasizing Path-mounting crawling
The World Wide Web (WWW) is being prolonged by an impulsive speed. As a result, search engines encounter many challenges such as yielding accurate and conversant results to the users, and responding them in an ap...
ETHICAL HACKING IN WINDOWS ENVIRONMENT
This paper, shows by demonstration with System Penetration, how to reveal security holes by using some tools like ‘Cain and Abel’ and ‘Wireshark’ and carrying out the attacks such as cracking password, performing man in...
COMMON FIXED POINT THEOREMS OF ITERATIONS FOR WEAKCONTRACTION IN CONE METRIC SPACES
In the present paper we prove common fixed point theorems in complete cone metric Spaces for weak contractionwhich generalize and extend some well-known previous results of [9].
REVIEW PAPER-MARINE MICROBIAL BIOACTIVE COMPOUNDS
Oceans have borne most of the biological activities on our planet. A number of biologically active compounds with varying degrees of action, such as anti-tumor, anti-cancer, anti-microtubule, anti-proliferative, cy...