*The book stresses rigorous definitions and proofs.*

**Author**: Michael Luby

**Publisher:** Princeton University Press

**ISBN:** 9780691206844

**Category:** Mathematics

**Page:** 248

**View:** 996

*The book stresses rigorous definitions and proofs.*

**Author**: Michael Luby

**Publisher:** Princeton University Press

**ISBN:** 9780691206844

**Category:** Mathematics

**Page:** 248

**View:** 996

*[435 [436 [437 [438 [439] [440 [441] [442 [443 [444 [445 [446 [447) H.
Niederreiter and I. E. Shparlinski, 'Recent advances in the theory of nonlinear
*

**Author**: Igor Shparlinski

**Publisher:** Birkhäuser

**ISBN:** 9783034880374

**Category:** Mathematics

**Page:** 414

**View:** 260

*Original publisher: Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] OCLC Number: (OCoLC)604992236 Subject: Random number generators.*

**Author**: U.S. Government

**Publisher:** Books LLC

**ISBN:** 1234475596

**Category:**

**Page:** 132

**View:** 120

*1.3 Pseudorandomness In practice “pseudorandom” sequences are used instead *

of truly random Sequences in many applications. The underlying belief is that if

an (efficient) application performs well when using a truly random sequence ...

**Author**: Oded Goldreich

**Publisher:** Springer Science & Business Media

**ISBN:** 9783662125212

**Category:** Mathematics

**Page:** 183

**View:** 862

*This book covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols, presenting techniques and protocols for key exchange, user ID, electronic elections and digital cash.*

**Author**: Hans Delfs

**Publisher:** Springer Science & Business Media

**ISBN:** 9783642871269

**Category:** Computers

**Page:** 310

**View:** 966

*This book is also suitable for researchers and practitioners in industry.*

**Author**: Serge Vaudenay

**Publisher:** Springer Science & Business Media

**ISBN:** 9780387258805

**Category:** Computers

**Page:** 336

**View:** 937

*... which is a collection of tests for the evaluation of both true random and
pseudorandom number generators for cryptographic applications. Our
experiment results show that some correlations of dependent exist among the
randomness tests, ...*

**Author**: Yongdae Kim

**Publisher:** Springer

**ISBN:** 9783319051499

**Category:** Computers

**Page:** 273

**View:** 665

*Proceedings of an International Conference on Coding Theory, Cryptography
and Related Areas, held in Guanajuato, ... [2] to implement the families of
permutations $ and # and a *

**Author**: Johannes Buchmann

**Publisher:** Springer Science & Business Media

**ISBN:** 3540662480

**Category:** Computers

**Page:** 260

**View:** 979

*Many fields need random and pseudorandom numbers, especially in
cryptographic applications. d-bit segment binary pseudorandom numbers can be
more easily used for block encryption. This paper studies on the statistical test for
binary d ...*

**Author**: Derong Liu

**Publisher:** Springer

**ISBN:** 9783642387869

**Category:** Computers

**Page:** 418

**View:** 545

*2 PRNGs Based on Reduction Arguments A definitive source for provably secure
techniques regarding pseudorandom number generators and related primitives
is *

**Author**: Adam Young

**Publisher:** John Wiley & Sons

**ISBN:** UOM:39015061332923

**Category:** Computers

**Page:** 392

**View:** 508

*A rigorous treatment of Encryption, Signatures, and General Cryptographic Protocols, emphasizing fundamental concepts.*

**Author**: Oded Goldreich

**Publisher:** Cambridge University Press

**ISBN:** 0521830842

**Category:** Computers

**Page:** 426

**View:** 689

*A more practical version of a one-time pad is based on pseudorandom
generators, which are used to stretch a small truly ... They have many
cryptographic applications, and we'll also see a fascinating complexity
application in Chapter 23.*

**Author**: Sanjeev Arora

**Publisher:** Cambridge University Press

**ISBN:** 1139477366

**Category:** Computers

**Page:**

**View:** 627

*In this work we describe a single key cryptographic system based on one- and
two-dimensional non-uniform cellular automata that produce high-quality pseudo
-random bit sequences. ... Here we will describe the application of some types of
cellular automata in this domain. Cellular ... Our encryption scheme is based on
the generation of pseudorandom bit sequences by cellular automata as in [13, 7].*

**Author**: france Conference on Parallel Problem Solving from Nature 2000 Paris

**Publisher:** Springer Science & Business Media

**ISBN:** 3540410562

**Category:** Computers

**Page:** 914

**View:** 777

*Java web page. http://www.ibm.com/ developer/java. [18] Ipsec. IP Security
Protocol, IETF working group. http://www.ietf. org/html. charters/ ipsec – charter.
html. [19] Michael George Luby. *

**Author**:

**Publisher:** IEEE

**ISBN:** 0769506658

**Category:** Computers

**Page:** 256

**View:** 584

*[ 6 ] W. Diffie and M. Hellman , New Directions in Cryptography , in IEEE
Transaction in Information Theory , 22 , 1976 . ( 19 ) M. Luby , Pseudo -
Randomness and Cryptographic Applications , Princeton University Press ,
Prince ton , NJ , 1996 .*

**Author**:

**Publisher:**

**ISBN:** UOM:39015048125416

**Category:** Formal languages

**Page:**

**View:** 510

*( 18 ) L. Levin , One - way Functions and PseudoRandom Generators , in
Combinatorica , vol . 7 , n . 4 , 1987 . ( 19 ) M. Luby , Pseudo - Randomness and
Cryptographic Applications , Princeton University Press , Princeton , NJ , 1996 .*

**Author**:

**Publisher:**

**ISBN:** UCSC:32106015047209

**Category:** Atlanta, GA

**Page:** 790

**View:** 969

*Katalin Gyarmati Measures of Pseudorandomness Abstract: In the second half of
the 19905 Christian Mauduit and ... in cryptography and number theory since
these objects are widely used in modern cryptography, in applications of the
Monte ...*

**Author**: Pascale Charpin

**Publisher:** Walter de Gruyter

**ISBN:** 9783110283600

**Category:** Mathematics

**Page:** 285

**View:** 696

*languages, and do a good job in most simulation applications.
PSEUDORANDOM NUMBER GENERATORS IN CRYPTOGRAPHY Like
stochastic simulations, most cryptographic applications require some source of
randomness. Examples ...*

**Author**: Michael J. Chinni

**Publisher:**

**ISBN:** CORNELL:31924070717669

**Category:** Airplanes

**Page:** 269

**View:** 810

*Revolutionary developments which took place in the 1980's have transformed cryptography from a semi-scientific discipline to a respectable field in theoretical Computer Science.*

**Author**: Oded Goldreich

**Publisher:** Now Publishers Inc

**ISBN:** 1933019026

**Category:** Technology & Engineering

**Page:** 128

**View:** 651