Pseudorandom number generator

Results: 243



#Item
21The Linux Pseudorandom Number Generator Revisited Patrick Lacharme ∗ Andrea Röck † Vincent Strubel ‡ Marion Videau §

The Linux Pseudorandom Number Generator Revisited Patrick Lacharme ∗ Andrea Röck † Vincent Strubel ‡ Marion Videau §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-24 12:00:20
    22

    PDF Document

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2013-07-31 04:39:02
    23Randomness: between faith and reality Yaoyun Shi University of Michigan joint works with Carl Miller (arXiv:&), Kai-Min Chung and Xiaodi Wu (arXiv:)

    Randomness: between faith and reality Yaoyun Shi University of Michigan joint works with Carl Miller (arXiv:&), Kai-Min Chung and Xiaodi Wu (arXiv:)

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-05-13 01:17:02
    24CRYPTMT STREAM CIPHER VERSION 3 MAKOTO MATSUMOTO, MUTSUO SAITO, TAKUJI NISHIMURA, AND MARIKO HAGITA Abstract. In the previous manuscripts, we proposed CryptMT pseudorandom number generator (PRNG) for a stream cipher, whi

    CRYPTMT STREAM CIPHER VERSION 3 MAKOTO MATSUMOTO, MUTSUO SAITO, TAKUJI NISHIMURA, AND MARIKO HAGITA Abstract. In the previous manuscripts, we proposed CryptMT pseudorandom number generator (PRNG) for a stream cipher, whi

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-03-29 16:18:53
      25Pseudorandom Number Generator Enocoro Specification Ver. 2.0 Hitachi, Ltd. 2 February 2010

      Pseudorandom Number Generator Enocoro Specification Ver. 2.0 Hitachi, Ltd. 2 February 2010

      Add to Reading List

      Source URL: www.cryptrec.go.jp

      Language: English - Date: 2010-02-01 22:07:54
        26Random Number Generators: Introduction for Operating System Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to creat

        Random Number Generators: Introduction for Operating System Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to creat

        Add to Reading List

        Source URL: www.nsa.gov

        Language: English - Date: 2014-07-17 09:45:36
        27On the Use of Financial Data as a Random Beacon Jeremy Clark University of Waterloo Urs Hengartner University of Waterloo

        On the Use of Financial Data as a Random Beacon Jeremy Clark University of Waterloo Urs Hengartner University of Waterloo

        Add to Reading List

        Source URL: www.usenix.org

        Language: English - Date: 2010-07-01 11:29:02
        28This version: May 16, 2013  TestU01 A Software Library in ANSI C for Empirical Testing of Random Number Generators User’s guide, compact version

        This version: May 16, 2013 TestU01 A Software Library in ANSI C for Empirical Testing of Random Number Generators User’s guide, compact version

        Add to Reading List

        Source URL: simul.iro.umontreal.ca

        Language: English - Date: 2014-06-03 18:19:00
        29TUB @ MediaEval 2013 Visual Privacy Task: Reversible Scrambling with colour-preservative Characteristic Sebastian Schmiedeke, Pascal Kelm, and Thomas Sikora Communication Systems Group Technische Universität Berlin, Ger

        TUB @ MediaEval 2013 Visual Privacy Task: Reversible Scrambling with colour-preservative Characteristic Sebastian Schmiedeke, Pascal Kelm, and Thomas Sikora Communication Systems Group Technische Universität Berlin, Ger

        Add to Reading List

        Source URL: elvera.nue.tu-berlin.de

        Language: English - Date: 2013-10-11 05:39:27
        30IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

        IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

        Add to Reading List

        Source URL: www.cba.mit.edu

        Language: English - Date: 2011-12-13 18:32:02