Corpus ID: 28490758

Running head : RANDOM NUMBER GENERATION 1 Random Number Generation : Types and Techniques

  title={Running head : RANDOM NUMBER GENERATION 1 Random Number Generation : Types and Techniques},
  author={David F DiCarlo},

Figures from this paper


SHOWING 1-10 OF 25 REFERENCES Retrieved 10/16/2011 from
  • 2011
Random Number Generators
Analysis of an on-line random number generator
  • Retrieved 10/16/2011 from
  • 2001
Random number generators : An evaluation and comparison of random . org and some commonly used generators
  • 2005
Random Number Generation in C + + 11
For programmers seeking to familiarize themselves with the <random> component of the C++11 standard library, we provide background information and tutorial guidance with numerous usage examples.
Ron was wrong, Whit is right
The conclusion is that the validity of the assumption that different random choices are made each time keys are generated is questionable and that generating keys in the real world for ``multiple-secrets'' cryptosystems such as RSA is significantly riskier than for ``single-secret'' ones such as ElGamal or (EC,DSA which are based on Diffie-Hellman. Expand
All-optical fast random number generator.
A scheme of all-optical random number generator (RNG), which consists of an ultra-wide bandwidth (UWB) chaotic laser, an all-Optical sampler and an all theoptical comparator, which can generate 10Gbit/s random numbers in the authors' simulation. Expand
Practical Next Bit Test for Evaluating Pseudorandom Sequences
This paper uses both the stochastic dynamic programming and Bayesian inferences concepts to design an optimum-acceptance-sampling-plan policy in quality control environments and derives some properties for the optimal value of the objective function. Expand
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks
This paper proposes a general model which, under mild assumptions, will generate provably random bits with some tolerance to adversarial manipulation and running in the megabit-per-second range, and develops fault-attack models and the properties of resilient functions to withstand such attacks. Expand
Did NSA put a secret backdoor in new encryption standard? Wired
  • (November,
  • 2007