Pseudorandom number generator

Results: 243



#Item
21

The Linux Pseudorandom Number Generator Revisited Patrick Lacharme ∗ Andrea Röck † Vincent Strubel ‡ Marion Videau §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-24 12:00:20
    22Pseudorandom number generators / Cryptography / Multiply-with-carry / Random number generation / Fortuna / Entropy / Random seed / RSA / E0 / Pseudorandomness / Yarrow algorithm / Cryptographically secure pseudorandom number generator

    PDF Document

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2013-07-31 04:39:02
    23Random number generation / Entropy / /dev/random / Min-entropy / Key / Random number / Randomness extractor / Cryptographically secure pseudorandom number generator / Randomness / Cryptography / Applied mathematics

    Randomness: between faith and reality Yaoyun Shi University of Michigan joint works with Carl Miller (arXiv:&), Kai-Min Chung and Xiaodi Wu (arXiv:)

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-05-13 01:17:02
    24

    CRYPTMT STREAM CIPHER VERSION 3 MAKOTO MATSUMOTO, MUTSUO SAITO, TAKUJI NISHIMURA, AND MARIKO HAGITA Abstract. In the previous manuscripts, we proposed CryptMT pseudorandom number generator (PRNG) for a stream cipher, whi

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-03-29 16:18:53
      25

      Pseudorandom Number Generator Enocoro Specification Ver. 2.0 Hitachi, Ltd. 2 February 2010

      Add to Reading List

      Source URL: www.cryptrec.go.jp

      Language: English - Date: 2010-02-01 22:07:54
        26Mathematics / Applied mathematics / Information theory / Random number generation / Entropy / Modular arithmetic / Key management / Linear congruential generator / Pseudo-ring / Cryptography / Pseudorandom number generators / Randomness

        Random Number Generators: Introduction for Operating System Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to creat

        Add to Reading List

        Source URL: www.nsa.gov

        Language: English - Date: 2014-07-17 09:45:36
        27Information theory / Randomness / Pseudorandom number generators / Mathematical finance / Stock market / Entropy / Cryptographically secure pseudorandom number generator / Min-entropy / Normal distribution / Statistics / Probability and statistics / Cryptography

        On the Use of Financial Data as a Random Beacon Jeremy Clark University of Waterloo Urs Hengartner University of Waterloo

        Add to Reading List

        Source URL: www.usenix.org

        Language: English - Date: 2010-07-01 11:29:02
        28Computing / Computer programming / Pseudorandom number generators / Random number generation / Ring theory / Pseudo-ring / Pseudorandomness / Generator / Hardware random number generator / TestU01 / Randomness / Cryptography

        This version: May 16, 2013 TestU01 A Software Library in ANSI C for Empirical Testing of Random Number Generators User’s guide, compact version

        Add to Reading List

        Source URL: simul.iro.umontreal.ca

        Language: English - Date: 2014-06-03 18:19:00
        29Image processing / Identity management / Privacy / Peak signal-to-noise ratio / Internet privacy / Pseudorandom number generator / Random number generation / Visual privacy / Ethics / Digital television / Noise

        TUB @ MediaEval 2013 Visual Privacy Task: Reversible Scrambling with colour-preservative Characteristic Sebastian Schmiedeke, Pascal Kelm, and Thomas Sikora Communication Systems Group Technische Universität Berlin, Ger

        Add to Reading List

        Source URL: elvera.nue.tu-berlin.de

        Language: English - Date: 2013-10-11 05:39:27
        30Mathematics / Cryptography / Binary arithmetic / Linear feedback shift register / Pseudorandomness / Stream cipher / Information theory / Factor graph / Pseudorandom generator / Pseudorandom number generators / Theoretical computer science / Applied mathematics

        IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

        Add to Reading List

        Source URL: www.cba.mit.edu

        Language: English - Date: 2011-12-13 18:32:02
        UPDATE