Pseudorandom number generator

Results: 243



#Item
101RC4 / Distinguishing attack / Py / Permutation / Weak key / Related-key attack / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-03-18 09:06:03
102Pseudorandom number generators / Cryptography / Binary arithmetic / Linear feedback shift register / Knapsack problem / Theoretical computer science / Applied mathematics / Mathematics

Cryptanalysis of the Knapsack Generator

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-02-14 15:21:20
103Information theory / Pseudorandomness / Random number generation / Hardware random number generator / National Security Agency / Cryptographic hash function / Entropy / Block cipher / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

NIST Special Publication[removed]Recommendation for Random Number Generation Using Deterministic Random Bit Generators Elaine Barker

Add to Reading List

Source URL: web.archive.org

Language: English
104Pseudorandom number generators / Key / National Institute of Standards and Technology / CRYPTREC / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

NIST removes cryptography algorithm from random number generator recommendations

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-02-26 04:25:01
105Pseudo-ring / Mathematics / Pseudorandom number generators / Randomness / Information theory / Random number generation

Random Number Generator Certificate Operator: Gaussian Networks Pvt Ltd Operator URL: www.adda52.com This is to certify that iTech Labs has evaluated the Random Number Generator (RNG) used by Gaussian

Add to Reading List

Source URL: www.itechlabs.com.au

Language: English - Date: 2014-01-26 04:07:50
106Linear congruential generator / Multiplier / Inversive congruential generator / Generalized inversive congruential pseudorandom numbers / Pseudorandom number generators / Modular arithmetic / Mathematics

BULLETIN OF THE AMERICAN MATHEMATICAL SOCIETY Volume 82, Number 6, November 1976 STATISTICAL INDEPENDENCE O F LINEAR CONGRUENTIAL PSEUDO-RANDOM NUMBERS

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2010-01-14 13:11:23
107Mathematics / Hardware random number generator / Randomized algorithm / Pseudorandomness / Random number generation / Pseudorandom number generator / Entropy / Random permutation / Cryptographically secure pseudorandom number generator / Randomness / Cryptography / Applied mathematics

The Importance of Reliable Randomness A Note on Random Number Generation and Combinatorial Sampling Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
108Randomness / Mathematics / Pseudorandomness / Evolutionary computation / Pseudorandom number generator / Random number generation / Algorithm / Evolution / Computer music / Theoretical computer science / Science / Applied mathematics

Can An Evolutionary Process Create English Text? David H. Bailey* [removed]Abstract Critics of the conventional theory of biological evolution have asserted that while natural processes might result in some limited div

Add to Reading List

Source URL: www.dhbailey.com

Language: English - Date: 2009-10-14 15:12:20
109Binary arithmetic / Linear feedback shift register / Stream cipher / Self-shrinking generator / Sequence / Computing / Shift register / Correlation attack / Grain / Pseudorandom number generators / Cryptography / Mathematics

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
110Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
UPDATE