Pseudorandomness

Results: 273



#Item
61Mathematics / Randomness extractor / Hardware random number generator / Random number generation / Pseudorandomness / Information theory / Extractor / Random sequence / Entropy / Randomness / Cryptography / Applied mathematics

Contents Introduction ................................................................................................................ 3 Quantis TRNG .....................................................................

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
62Applied mathematics / Hardware random number generator / Random number generation / Pseudorandomness / Entropy / Pseudorandom number generator / Photon / Key / Applications of randomness / Cryptography / Randomness / Physics

Quantum random number generator combines best of two approaches

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-05-11 18:53:43
63Randomness / CUDA / GPGPU / Graphics hardware / Nvidia / Random number generation / Integer / Pseudorandomness / Ip / Computing / Computer programming / Software engineering

CURAND LIBRARY PG_v7.0 | March 2015 Programming Guide

Add to Reading List

Source URL: docs.nvidia.com

Language: English - Date: 2015-02-18 15:11:46
64Theoretical computer science / Linear congruential generator / Mersenne twister / Random number generation / TestU01 / Pseudorandomness / RANDU / Xorshift / Lagged Fibonacci generator / Pseudorandom number generators / Mathematics / Applied mathematics

A PCG: A Family of Simple Fast Space-Efficient Statistically Good Algorithms for Random Number Generation MELISSA E. O’NEILL, Harvey Mudd College This paper presents a new uniform pseudorandom number generation scheme

Add to Reading List

Source URL: www.pcg-random.org

Language: English - Date: 2014-09-05 18:33:41
65Probability theory / Advantage / Oracle machine / Standard model / Oracle Corporation / Pseudorandom function family / Random function / Computational complexity theory / Pseudorandomness / Cryptography / Cryptographic hash functions / Random oracle

The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-01 15:32:21
66Random number generation / Hardware random number generator / Pseudorandomness / Statistical randomness / Pseudorandom number generator / One-time pad / Random sequence / Fortuna / Entropy / Randomness / Cryptography / Applied mathematics

Table of contents Summary .............................................................................................................................................. 3 Applications of random numbers..................

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
67Hardware random number generator / Random number generation / Id Quantique / Pseudorandom number generator / Pseudorandomness / Randomness / Cryptography / Computer peripherals

USER CASE REDEFINING RANDOMNESS Loterie Romande Quantum Draws for Lottery Games in Switzerland Quantis True Random Number Generator in Lottery Application

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
68Pseudorandomness / Computational complexity theory / Randomness / Hashing / Pseudorandom generator theorem / Pseudorandom generator / One-way function / Hard-core predicate / Cryptographic hash function / Cryptography / Theoretical computer science / Applied mathematics

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
69Advantage / Pseudorandom function family / Pseudorandom permutation / Function / Permutation / Randomized algorithm / Unpredictable permutation / Cryptography / Mathematics / Pseudorandomness

Chapter 3 Pseudorandom Functions Pseudorandom functions (PRFs) and their cousins, pseudorandom permutations (PRPs), figure as central tools in the design of protocols, especially those for shared-key cryptography. At one

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:44
70Information theory / Key management / Linear congruential generator / Random number generation / Random number generator attack / Entropy / Randomizer / One-time pad / Pseudorandomness / Cryptography / Randomness / Pseudorandom number generators

PDF Document

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2003-12-11 08:24:36
UPDATE