Many computer applications use random numbers as an important computational resource, and they often require random numbers of particular probability distributions. We consider a very general model of random number generation that converts a source that produces symbols according to a probability distribution into a random numbers of another probability distribution. In such a procedure, we are particularly interested in the average amount of source symbols to produce an output, which we call efficiency of the procedure. We discuss the entropy bound for the efficiency of random number generation, and as a main contribution, we give a new elementary proof for the entropy bound. Key words: Random number generation, Shannon entropy, informatio...
Entropy in computer security is associated with the unpredictability of a source of randomness. The ...
Random number generators have direct applications in information security, online gaming, gambling, ...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
This paper is focused on generating random number via entropy generators. There are described source...
We analyze the thermodynamic costs of the three main approaches to generating random number...
International audienceIn this paper, we provide a complete set of algorithms aimed at the design and...
Random and pseudorandom number generators (RNG and PRNG) are used for many purposes including crypto...
One of Shannon's intuitive schemes for estimating the Entropy of printed English is generalized here...
This paper describes a method to randomly generate vectors of symbol probabilities so that the corre...
We revisit the classical problem: given a memoryless source having a certain amount of Shannon Entro...
Abstract: One of the services provided by the operating system to the applications is random number ...
The generation of random numbers via quantum processes is an efficient and reliable method to obtain...
In this work we deal with both Coding Theory and Entropy Extraction for Random Number Generators to ...
none3siA chaotic-map random number generator (RNG) is defined using a chaotic map and a bit-generati...
We provide a new result that links two crucial entropy notions: Shannon Entropy H1 and collision ent...
Entropy in computer security is associated with the unpredictability of a source of randomness. The ...
Random number generators have direct applications in information security, online gaming, gambling, ...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
This paper is focused on generating random number via entropy generators. There are described source...
We analyze the thermodynamic costs of the three main approaches to generating random number...
International audienceIn this paper, we provide a complete set of algorithms aimed at the design and...
Random and pseudorandom number generators (RNG and PRNG) are used for many purposes including crypto...
One of Shannon's intuitive schemes for estimating the Entropy of printed English is generalized here...
This paper describes a method to randomly generate vectors of symbol probabilities so that the corre...
We revisit the classical problem: given a memoryless source having a certain amount of Shannon Entro...
Abstract: One of the services provided by the operating system to the applications is random number ...
The generation of random numbers via quantum processes is an efficient and reliable method to obtain...
In this work we deal with both Coding Theory and Entropy Extraction for Random Number Generators to ...
none3siA chaotic-map random number generator (RNG) is defined using a chaotic map and a bit-generati...
We provide a new result that links two crucial entropy notions: Shannon Entropy H1 and collision ent...
Entropy in computer security is associated with the unpredictability of a source of randomness. The ...
Random number generators have direct applications in information security, online gaming, gambling, ...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...