Pseudorandom generator

Results: 304



#Item
241Fibonacci numbers / Applied mathematics / Lagged Fibonacci generator / Combinatorics / Parallel computing / Binomial coefficient / NC / Random number generation / Generalizations of Fibonacci numbers / Mathematics / Theoretical computer science / Pseudorandom number generators

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING ARTICLE NO.

Add to Reading List

Source URL: astro.uchicago.edu

Language: English - Date: 2004-10-07 18:03:43
242Applied mathematics / Pseudorandom number generators / Cryptographic hash function / Pseudorandomness / Random number generation / National Security Agency / Block cipher / Entropy / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Information theory

NIST Special Publication[removed]Recommendation for Random

Add to Reading List

Source URL: llamasinmynetwork.com

Language: English - Date: 2013-08-01 17:03:41
243Randomness / Computational complexity theory / Information theory / Pseudorandomness / Hashing / Randomness extractor / Leftover hash lemma / Entropy / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2010-10-20 22:30:55
244Randomness / Monte Carlo methods / Nuclear technology / Non-uniform random numbers / Pseudorandomness / Random number generation / Pseudorandom number generator / Neutron / John von Neumann / Physics / Mathematics / Probability and statistics

Monte Carlo and the MONTE CARL0 METHOD

Add to Reading List

Source URL: library.lanl.gov

Language: English - Date: 2006-12-18 18:15:47
245Applied mathematics / Stream ciphers / Binary arithmetic / Linear feedback shift register / Correlation attack / E0 / Polynomial / Recurrence relation / RC4 / Cryptography / Pseudorandom number generators / Mathematics

New Attack Strategy for the Shrinking Generator Pino Caballero-Gil1, Amparo Fúster-Sabater2 and M. Eugenia Pazo-Robles3 1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-05-03 20:00:46
246Block ciphers / Stream ciphers / IAPM / Block cipher / Authenticated encryption / UMAC / CBC-MAC / Pseudorandom number generator / Index of cryptography articles / Cryptography / Message authentication codes / Block cipher modes of operation

Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-24 19:35:04
247Complexity classes / Computational resources / Pseudorandomness / Analysis of algorithms / Advice / Bounded-error probabilistic polynomial / NTIME / Pseudorandom generator / Circuit complexity / Theoretical computer science / Computational complexity theory / Applied mathematics

In Search of an Easy Witness: Exponential Time vs. Probabilistic Polynomial Time Russell Impagliazzo∗

Add to Reading List

Source URL: www.math.ias.edu

Language: English - Date: 2003-11-18 15:48:52
248Auction theory / Auctioneering / Combinatorial auction / Algorithmic mechanism design / Computational complexity theory / Algorithmic game theory / Pseudorandom generator / Nisan / Communication complexity / Theoretical computer science / Applied mathematics / Game theory

Noam Nisan School of Computer Science and Engineering Hebrew University of Jerusalem, Israel

Add to Reading List

Source URL: www.cs.huji.ac.il

Language: English - Date: 2013-04-23 14:36:31
249Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Randomized algorithm / Blum Blum Shub / Information theory / XTR / Theoretical computer science / Applied mathematics / Mathematics

Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science[removed]–375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-02-27 04:40:52
250Hardware random number generator / Random number generation / Entropy / Pseudorandomness / One-time pad / Key / SHA-1 / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

® THE INTEL RANDOM NUMBER GENERATOR

Add to Reading List

Source URL: www.cryptography.com

Language: English - Date: 2010-04-24 19:08:39
UPDATE