Pseudorandomness

Results: 273



#Item
231Hardware random number generator / Random number generation / Entropy / Pseudorandomness / One-time pad / Key / SHA-1 / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

® THE INTEL RANDOM NUMBER GENERATOR

Add to Reading List

Source URL: www.cryptography.com

Language: English - Date: 2010-04-24 19:08:39
232Applied mathematics / Linear congruential generator / Random number generation / Pseudo-ring / Pseudorandomness / Spectral test / Fortuna / TestU01 / Lehmer random number generator / Pseudorandom number generators / Mathematics / Cryptography

A Better Random Number Generator for Apple’s Floating Point BASIC Cem Kaner & John R. Vokey

Add to Reading List

Source URL: www.kaner.com

Language: English - Date: 2010-08-09 01:13:43
233Pseudorandom number generators / Applied mathematics / Algorithmic information theory / Information theory / Random number generation / Pseudorandomness / Linear congruential generator / Statistical randomness / RANDU / Randomness / Mathematics / Cryptography

Random Numbers – Who, What, When, Where, Why? Andy Mitchell Course: Math 4901

Add to Reading List

Source URL: www.morris.umn.edu

Language: English - Date: 2008-04-25 18:24:13
234Mathematics / Randomized algorithm / Random number generation / Pseudorandomness / Pseudorandom number generator / Advantage / Random sequence / Low-discrepancy sequence / Random variate / Randomness / Cryptography / Applied mathematics

Generating Quasi-Random Sequences from Slightly-Random Sources. (Extended Abstract) M i k l o s Santha’

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2005-06-09 20:48:38
235Pseudorandomness / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Keystream / SEAL / Cipher / SHA-1 / Block cipher / Cryptography / Stream ciphers / Theoretical computer science

To appear in J. of Cryptology

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2008-09-21 22:35:16
236Pseudorandom function family / One-time pad / Advantage / Cipher / Block ciphers / Initialization vector / Pseudorandom generator / Cryptography / Pseudorandomness / Stream cipher

Stream-Ciphers and Block-Ciphers Lecture 6

Add to Reading List

Source URL: www.cs.uiuc.edu

Language: English - Date: 2007-10-25 08:48:59
237Applied mathematics / Mersenne twister / Linear congruential generator / Pseudorandomness / Primitive polynomial / Recurrence relation / Random number generation / Pseudorandom generator theorem / Inversive congruential generator / Pseudorandom number generators / Mathematics / Theoretical computer science

This paper is to appear in \ACM Transactions on Modeling and Computer Simulations: Special Issue on Uniform Random Number Generation" (Early in

Add to Reading List

Source URL: www.math.sci.hiroshima-u.ac.jp

Language: English - Date: 2006-03-03 17:05:47
238Pseudorandomness / Pseudorandom number generators / Pseudorandom generator theorem / Pseudorandom generator / Randomized algorithm / Blum Blum Shub / Information theory / Random number generation / XTR / Theoretical computer science / Applied mathematics / Mathematics

LNCS[removed]Concrete Security of the Blum-Blum-Shub Pseudorandom Generator

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-01-17 09:21:48
239/dev/random / Random number generation / Cryptographic hash function / Entropy / Padding / Fortuna / Pseudorandomness / Key / MD5 / Cryptography / Randomness / Pseudorandom number generators

Software Generation of Practically Strong Random Numbers Peter Gutmann Department of Computer Science

Add to Reading List

Source URL: www.cs.auckland.ac.nz

Language: English - Date: 1998-02-12 15:33:43
240Mathematics / Linear congruential generator / Witty / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Pseudorandom number generators / Cryptography / Applied mathematics

Outwitting the Witty Worm – Exploiting Underlying Structure for Detailed Reconstruction of an Internet-Scale Event

Add to Reading List

Source URL: eeweb.poly.edu

Language: English - Date: 2005-10-23 22:23:46
UPDATE