Pseudorandom number generators

Results: 265



#Item
61Stream ciphers / Correlation attack / Linear feedback shift register / Polynomials / Feedback with Carry Shift Registers / Summation generator / Algebraic equation / Cryptography / Pseudorandom number generators / Mathematics

Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon National Security Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea {dlee,jaeheon,jinhon

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-06 19:36:50
62Applied mathematics / MUGI / Pseudorandom number generators / Linear feedback shift register / Correlation attack / Random number generation / Statistical randomness / Randomness tests / Linear cryptanalysis / Cryptography / Randomness / Stream ciphers

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-04-08 23:59:34
63Cryptography / Pseudorandomness / Information theory / Pseudorandom number generators / Random number generation / Pseudorandom generator / Entropy / Extractor / Randomness extractor / Theoretical computer science / Applied mathematics / Randomness

Exploiting Poor Randomness Nadia Heninger University of Pennsylvania October 13, 2014

Add to Reading List

Source URL: attackschool.di.uminho.pt

Language: English - Date: 2014-11-03 05:59:17
64Key management / /dev/random / Unix / Random number generation / Cryptographic hash function / Entropy / Padding / Pseudorandomness / Fortuna / Cryptography / Randomness / Pseudorandom number generators

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
65Pseudorandom number generators / Information theory / Entropy / Random number generation / Key / Cryptographically secure pseudorandom number generator / Fortuna / Cryptography / Randomness / Thermodynamic entropy

On Randomness Version 0.1 Ben Laurie http://www.apache-ssl.org/ben.html December 29, 2004

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:33
66One-way function / Random number generation / Computational complexity theory / Random password generator / Cryptography / Randomness / Pseudorandom number generators

CS355: Topics in cryptography Fall 2002 Assignment 0.5: Warm-Up Questions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-10-22 22:16:40
67Computer architecture / Randomness / Applied mathematics / Entropy / Random number generation / Cisco IOS / IOS / Mac OS X / Kernel / Pseudorandom number generators / Mach / Cryptography

Revisiting iOS Kernel (In)Security: Attacking the Early Random PRNG Tarjei Mandt CanSecWest 2014

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2014-03-19 04:39:20
68Randomness / Applied mathematics / Monte Carlo methods / Pseudorandom number generators / Random variate / Random number generation / Pseudorandomness / Exponential distribution / Inverse transform sampling / Non-uniform random numbers / Probability and statistics / Statistics

1 Introduction Non-uniform random variate generation is a small field of research somewhere between mathematics, statistics and computer science. It started in the fifties of the last century in the “stone-age” of

Add to Reading List

Source URL: statistik.wu-wien.ac.at

Language: English - Date: 2006-10-24 05:17:21
69Probability and statistics / Pseudorandom number generators / Theoretical computer science / Modular arithmetic / Linear congruential generator / Random number generation / Random sequence / Pseudorandomness / Algorithm / Statistics / Mathematics / Randomness

Testing Random Number Generators Dan Biebighauser University of Minnesota - Twin Cities REU Summer 2000

Add to Reading List

Source URL: www.math.umn.edu

Language: English - Date: 2004-07-26 18:46:35
70Randomness / Key management / Fortuna / ISAAC / Linear congruential generator / Cryptographic hash function / Random number generation / Mersenne twister / Advanced Encryption Standard / Cryptography / Pseudorandom number generators / Stream ciphers

Parallel Random Numbers: As Easy as 1, 2, 3 ∗ ∗† John K. Salmon, Mark A. Moraes, Ron O. Dror, and David E. Shaw

Add to Reading List

Source URL: www.thesalmons.org

Language: English - Date: 2011-10-02 11:06:07
UPDATE