Random and pseudorandom number generators (RNG and PRNG) are used for many purposes including cryptographic, modeling and simulation applications. For such applications a generated bit sequence should mimic true random, i.e., by definition, such a sequence could be interpreted as the result of the flips of a fair coin with sides that are labeled 0 and 1. It is known that the Shannon entropy of this process is 1 per letter, whereas for any other stationary process with binary alphabet the Shannon entopy is stricly less than 1. On the other hand, the entropy of the PRNG output should be much less than 1 bit (per letter), but the output sequence should look like truly random. We describe random processes for which those, in a first glance cont...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to u...
Random and pseudorandom number generators (RNG and PRNG) are used for many purposes including crypto...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
Many computer applications use random numbers as an important computational resource, and they often...
The algorithm utilizes the behavior of modern operating systems to generate random bits by putting t...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
In many applications, for example cryptography and Monte Carlo simulation, there is need for random ...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...
International audienceRandom number generators (RNGs) are computational or physical functions genera...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
We address the problem of detecting deviations of binary sequence from randomness,which is very imp...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to u...
Random and pseudorandom number generators (RNG and PRNG) are used for many purposes including crypto...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
Many computer applications use random numbers as an important computational resource, and they often...
The algorithm utilizes the behavior of modern operating systems to generate random bits by putting t...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
In many applications, for example cryptography and Monte Carlo simulation, there is need for random ...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...
International audienceRandom number generators (RNGs) are computational or physical functions genera...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
We address the problem of detecting deviations of binary sequence from randomness,which is very imp...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to u...