Pseudorandom number generator

Results: 243



#Item
11Pseudorandom number generators / Cryptography / Pseudorandomness / Randomness / Information theory / Random number generation / Dual EC DRBG / Fortuna / Pseudorandom generator / RdRand / RSA Security / PRGS

The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. Pat

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-03 14:14:07
12Signal processing / Autocorrelation / Covariance and correlation / Regression analysis / Time series analysis / Golomb ruler / Solomon W. Golomb / Pseudorandomness / Random sequence / Pseudorandom number generator

P ROGRAM — SETA–28 N OVEMBERMonday 24 November 09:00–09:30 Conference opening

Add to Reading List

Source URL: people.eng.unimelb.edu.au

Language: English - Date: 2014-11-23 16:19:00
13Pseudorandom number generators / Kleptography / National Institute of Standards and Technology / National Security Agency / Cryptography / NIST SP 800-90A / Random number generation / Hardware random number generator / Entropy / Dual EC DRBG / RdRand

Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-13 09:06:18
14Pseudorandom number generators / Cryptography / Randomness / Applied mathematics / Random number generation / Fortuna / Data-intensive computing / Pseudorandomness / Random walk / Cryptographically secure pseudorandom number generator

Myriad: Scalable and Expressive Data Generation Alexander Alexandrov∗ Kostas Tzoumas∗ Volker Markl∗

Add to Reading List

Source URL: stratosphere.eu

Language: English - Date: 2016-05-27 12:05:58
15Computing / Computer programming / Concurrent computing / Data management / Parallel computing / Distributed computing architecture / Pseudorandom number generator / MapReduce / Big data / Database / Generator / Pseudorandomness

Myriad – Parallel Data Generation on Shared-Nothing Architectures Alexander S. Alexandrov∗ Berni Schiefer†

Add to Reading List

Source URL: stratosphere.eu

Language: English - Date: 2016-05-27 12:05:58
16Pseudorandom number generators / Affine cipher / Index of standards articles

TECHNICAL CORRESPONDENCE his correspondence is motivated by two articles in Communications, one of them proposing an "industry standard" r a n d o m n u m b e r generator [10], the other describing machine language

Add to Reading List

Source URL: www.firstpr.com.au

Language: English - Date: 2012-03-14 05:33:31
17Cryptography / Stream ciphers / Pseudorandom number generators / Linear-feedback shift register / Correlation attack / Self-shrinking generator / Grain / QUAD / Turing / Shrinking generator / Shift register

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 04:05:33
18Randomness / Cryptography / Stochastic simulation / Information theory / Random number generation / Pseudorandomness / Pseudorandom number generator / Monte Carlo method / Sampling / Random variable / Random seed / Probability distribution

Random NumbersUsing PRG .......

Add to Reading List

Source URL: genome.sph.umich.edu

Language: English - Date: 2012-10-31 21:30:08
19Stream ciphers / Pseudorandom number generators / Algebra / Error detection and correction / Binary arithmetic / Linear-feedback shift register / BerlekampMassey algorithm / Correlation attack / Nonlinear feedback shift register / Polynomial / Recurrence relation / Key generator

Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 08:13:04
20Network performance / Cyberwarfare / Denial-of-service attacks / Pseudorandom number generator / Measuring network throughput / Network packet / Denial-of-service attack / Network telescope / Witty / Transmission Control Protocol / Code Red / Packet loss

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
UPDATE