Pseudorandomness

Results: 273



#Item
221Complexity classes / Pseudorandomness / Analysis of algorithms / Probabilistic complexity theory / One-way function / Hard-core predicate / NP / P versus NP problem / Time complexity / Theoretical computer science / Computational complexity theory / Applied mathematics

ICM 2002 • Vol. I • 245^272 Mathematical Foundations of

Add to Reading List

Source URL: www.mathunion.org

Language: English - Date: 2012-04-18 10:56:38
222Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Cryptography / Randomness / Pseudorandom generator / Random number generation / Elliptic curve cryptography / Normal distribution / Theoretical computer science / Applied mathematics / Mathematics

Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator Berry Schoenmakers and Andrey Sidorenko Dept. of Mathematics and Computer Science, TU Eindhoven,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-09-15 11:33:41
223Procedural programming languages / Cross-platform software / Approximate Bayesian computation / Normal distribution / Pseudorandomness / Simulation / C / Simula / Computing / Software engineering / Statistics

EasyABC: a R package to perform efficient approximate Bayesian computation sampling schemes Franck Jabot, Thierry Faure, Nicolas Dumoulin

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2013-08-29 11:12:39
224Applied mathematics / Pseudorandom number generators / Cryptographic hash function / Pseudorandomness / Random number generation / National Security Agency / Block cipher / Entropy / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Information theory

NIST Special Publication[removed]Recommendation for Random

Add to Reading List

Source URL: llamasinmynetwork.com

Language: English - Date: 2013-08-01 17:03:41
225Randomness / Computational complexity theory / Information theory / Pseudorandomness / Hashing / Randomness extractor / Leftover hash lemma / Entropy / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2010-10-20 22:30:55
226Randomness / Monte Carlo methods / Nuclear technology / Non-uniform random numbers / Pseudorandomness / Random number generation / Pseudorandom number generator / Neutron / John von Neumann / Physics / Mathematics / Probability and statistics

Monte Carlo and the MONTE CARL0 METHOD

Add to Reading List

Source URL: library.lanl.gov

Language: English - Date: 2006-12-18 18:15:47
227Theoretical computer science / Direct-sequence spread spectrum / Pseudorandom noise / Steganography / Linear feedback shift register / Cryptography / Maximum length sequence / Pseudorandom binary sequence / Stream cipher / Pseudorandomness / Mathematics / Applied mathematics

NEW ASPECTS of SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY and ARTIFICIAL VISION Secure Steganography for Audio Signals

Add to Reading List

Source URL: www.wseas.us

Language: English - Date: 2010-09-09 05:34:58
228Complexity classes / Computational resources / Pseudorandomness / Analysis of algorithms / Advice / Bounded-error probabilistic polynomial / NTIME / Pseudorandom generator / Circuit complexity / Theoretical computer science / Computational complexity theory / Applied mathematics

In Search of an Easy Witness: Exponential Time vs. Probabilistic Polynomial Time Russell Impagliazzo∗

Add to Reading List

Source URL: www.math.ias.edu

Language: English - Date: 2003-11-18 15:48:52
229Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Randomized algorithm / Blum Blum Shub / Information theory / XTR / Theoretical computer science / Applied mathematics / Mathematics

Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science[removed]–375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-02-27 04:40:52
230Cryptographic hash functions / Pseudorandomness / Permutations / Pseudorandom permutation / Advantage / Block cipher / Random permutation / Universal hashing / Feistel cipher / Cryptography / Search algorithms / Hashing

A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation M´etodo Gen´erico para Extender el Espacio del Mensaje de una Permutaci´on Pseudo-aleatoria

Add to Reading List

Source URL: www.scielo.org.mx

Language: English - Date: 2010-01-06 17:07:45
UPDATE