#### Figures from this paper

#### References

SHOWING 1-10 OF 25 REFERENCES

Random.org. Retrieved 10/16/2011 from http://www.random.org

- 2011

Analysis of an on-line random number generator

- Retrieved 10/16/2011 from http://www.random.org/analysis/Analysis2001.pdf
- 2001

Random number generators : An evaluation and comparison of random . org and some commonly used generators

- 2005

Random Number Generation in C + + 11

- 2013

For programmers seeking to familiarize themselves with the <random> component of the C++11 standard library, we provide background information and tutorial guidance with numerous usage examples.

Ron was wrong, Whit is right

- Mathematics, Computer Science
- IACR Cryptol. ePrint Arch.
- 2012

The conclusion is that the validity of the assumption that different random choices are made each time keys are generated is questionable and that generating keys in the real world for ``multiple-secrets'' cryptosystems such as RSA is significantly riskier than for ``single-secret'' ones such as ElGamal or (EC,DSA which are based on Diffie-Hellman. Expand

All-optical fast random number generator.

- Computer Science, Medicine
- Optics express
- 2010

A scheme of all-optical random number generator (RNG), which consists of an ultra-wide bandwidth (UWB) chaotic laser, an all-Optical sampler and an all theoptical comparator, which can generate 10Gbit/s random numbers in the authors' simulation. Expand

Practical Next Bit Test for Evaluating Pseudorandom Sequences

- Computer Science
- 2009

This paper uses both the stochastic dynamic programming and Bayesian inferences concepts to design an optimum-acceptance-sampling-plan policy in quality control environments and derives some properties for the optimal value of the objective function. Expand

A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks

- Mathematics, Computer Science
- IEEE Transactions on Computers
- 2007

This paper proposes a general model which, under mild assumptions, will generate provably random bits with some tolerance to adversarial manipulation and running in the megabit-per-second range, and develops fault-attack models and the properties of resilient functions to withstand such attacks. Expand

Did NSA put a secret backdoor in new encryption standard? Wired

- (November,
- 2007