Pseudorandom generator

Results: 304



#Item
201Algebra / Schwartz–Zippel lemma / Degree of a polynomial / Pseudorandom generator / Time complexity / Circuit complexity / Quasi-polynomial / Irreducible polynomial / NP / Mathematics / Polynomials / Theoretical computer science

Classifying polynomials and identity testing MANINDRA AGRAWAL1,∗ and RAMPRASAD SAPTHARISHI2 1 2

Add to Reading List

Source URL: www.ias.ac.in

Language: English - Date: 2010-02-23 06:21:54
202Pseudorandomness / Computational hardness assumptions / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Naor-Reingold Pseudorandom Function / Decisional Diffie–Hellman assumption / Pseudorandom function family / Randomized algorithm / Cryptography / Theoretical computer science / Applied mathematics

Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-16 13:57:22
203Dual EC DRBG / National Institute of Standards and Technology / Randomness / Security / National security / Random number generation / Nothing up my sleeve number / Random number generator attack / Pseudorandom number generators / Cryptography / National Security Agency

SP[removed], Dual EC, and NIST

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-14 10:03:26
204Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
205Randomness / Applied mathematics / Modular arithmetic / Information theory / Random number generation / Linear congruential generator / Lagged Fibonacci generator / White noise / Pseudorandomness / Pseudorandom number generators / Mathematics / Cryptography

Microsoft Word - final_paper_SUPERB2.doc

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2003-08-12 10:30:03
206Statistics / Scientific method / Information theory / Random number generation / Random.org / Hardware random number generator / Data analysis / Pseudorandom number generator / Statistical hypothesis testing / Randomness / Science / Information

TRINITY COLLEGE DUBLIN Management Science and Information Systems Studies Project Report THE DISTRIBUTED SYSTEMS GROUP, Computer Science Department, TCD.

Add to Reading List

Source URL: www.random.org

Language: English - Date: 2005-11-24 09:48:04
207Applied mathematics / Information theory / Random number generation / Hardware random number generator / Pseudorandomness / Random.org / Entropy / Test suite / Generator / Randomness / Cryptography / Pseudorandom number generators

Microsoft Word - Charmaine Kenny FYP Title Page.doc

Add to Reading List

Source URL: www.random.org

Language: English - Date: 2005-11-24 10:02:51
208Geography of Ireland / Random number generation / ECOGRA / Trinity College /  Dublin / Gambling / Dublin / Pseudorandom number generator / Europe / Random.org / Geography of Europe / Randomness

Dr. Mads Haahr Unit 20 2 Waterloo Road Dublin 4 web: www.random.org

Add to Reading List

Source URL: www.random.org

Language: English - Date: 2009-11-20 03:31:13
209Pseudorandom number generators / Applied mathematics / Entropy / Hardware random number generator / Random number generation / Pseudorandomness / Min-entropy / Initialization vector / RBG / Cryptography / Randomness / Information theory

NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:06:47
210Advantage / ICE / Quantum information science / Cryptographic hash functions / Quantum circuit / Pseudorandom generator theorem / Cryptography / Computational complexity theory / T-function

Distinguishing Attacks on T-functions Simon K¨ unzli1 , Pascal Junod2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:18:20
UPDATE