نتایج جستجو برای: random number generator
تعداد نتایج: 1429861 فیلتر نتایج به سال:
Barak and Halevi (BH) have proposed an efficient architecture for robust pseudorandom generators that ensure resilience in the presence of attackers with partial knowledge or partial controls of the generators’ entropy resources. The BH scheme is constructed from the Barak, Shaltiel and Tromer’s randomness extractor and its security is formalized in the simulation-based framework. The BH model ...
A physical random number generator based on the intrinsic randomness of quantum mechanics is described. The random events are realized by the choice of single photons between the two outputs of a beamsplitter. We present a simple device, which minimizes the impact of the photon counters’ noise, dead-time and after pulses. Random numbers are employed today as well for numerical simulations as fo...
Form 836 (8/00) Los Alamos National Laboratory, an affirmative action/equal opportunity employer, is operated by the University of California for the U.S. Department of Energy under contract W-7405-ENG-36. By acceptance of this article, the publisher recognizes that the U.S. Government retains a nonexclusive, royalty-free license to publish or reproduce the published form of this contribution, ...
In this note, we give a practical solution to the problem of determining the maximal period of matrix generators of pseudo-random numbers which are based on an integer-valued unimodular matrix of size NxN known as MIXMAX and arithmetic defined on a Galois field GF[p] with large prime modulus p. The existing theory of Galois finite fields is adapted to the present case, and necessary and suffici...
This paper develops an efficient pseudo-random number generator for validation of digital communication channels and secure disc. Drives. Simulation results validates the effectiveness of the random number generator.
Almost all cryptographic protocols require the generation and use of secret values that must be unknown to attackers. For example, random number generators are required to generate public/private keypairs for asymmetric (public key) algorithms including RSA, DSA, and Diffie-Hellman. Keys for symmetric and hybrid cryptosystems are also generated randomly. RNGs are also used to create challenges,...
[Editor’s Note: This paper was original printed in the January 1977, Volume I, Number 1, issue of Cryptologia (pp. 20-26) the premier issue. Over the years this one article has drawn more interest than any other article and requests for reprints of the paper come in year after year. The editors thought it appropriate to offer this paper to our readers. The original paper was set using WordStar ...
Recent advances in predictive data analytics and ever growing digitalization and connectivity with explosive expansions in industrial and consumer Internet-of-Things (IoT) has raised significant concerns about security of people’s identities and data. It has created close to ideal environment for adversaries in terms of the amount of data that could be used for modeling and also greater accessi...
It is a charity and is incorporated in England as a company limited by guarantee under the Companies Act (Reg. No. 70527)
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید