We obtain a lower bound on the linear complexity profile of the power generator of pseudo-random numbers modulo a Blum integer. A different method is also proposed to estimate the linear complexity profile of the Blum-Blum-Shub (1986) generator. In particular, these results imply that lattice reduction attacks on such generators are not feasible.4 page(s
Abstract. We look at iterated power generators si = s e i−1 mod N for a random seed s0 ∈ ZN that in ...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Nonlinear congruential methods are attractive alternatives to the classical linear congruential meth...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
10.1007/s00200-003-0116-6Applicable Algebra in Engineering, Communications and Computing136499-508AA...
AbstractLinear complexity and linear complexity profile are important characteristics of a sequence ...
AbstractLinear complexity and linear complexity profile are interesting characteristics of a sequenc...
Linear complexity and linear complexity profile are important characteristics of a sequence for appl...
This paper re-analyzes the algorithm proposed by Guedes, Assis, and Lula in 2012, which they claimed...
Abstract. We look at iterated power generators si = s e i−1 mod N for a random seed s0 ∈ ZN that in ...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Nonlinear congruential methods are attractive alternatives to the classical linear congruential meth...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi...
10.1007/s00200-003-0116-6Applicable Algebra in Engineering, Communications and Computing136499-508AA...
AbstractLinear complexity and linear complexity profile are important characteristics of a sequence ...
AbstractLinear complexity and linear complexity profile are interesting characteristics of a sequenc...
Linear complexity and linear complexity profile are important characteristics of a sequence for appl...
This paper re-analyzes the algorithm proposed by Guedes, Assis, and Lula in 2012, which they claimed...
Abstract. We look at iterated power generators si = s e i−1 mod N for a random seed s0 ∈ ZN that in ...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...