Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,304 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographically secure pseudorandom number generator
Known as:
Cryptographically secure pseudo-random number generator
, CPRNG
, CSPRNG
Expand
A cryptographically secure pseudo-random number generator (CSPRNG) or cryptographic pseudo-random number generator (CPRNG) is a pseudo-random number…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Block cipher
Block cipher mode of operation
Blum Blum Shub
Challenge–response authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Cryptographically Secure Pseudorandom Number Generators
R. T. Kneusel
2018
Corpus ID: 65116778
Cryptographically secure pseudorandom number generators (CSPRNGs) are pseudorandom number generators that protect against attack…
Expand
2014
2014
Efficient and cryptographically secure pseudorandom number generators based on chains of hybrid cellular automata maps
R. Dogaru
,
I. Dogaru
International Conference on Communications
2014
Corpus ID: 3139419
In this paper we consider several solutions for designing cryptographically good pseudo random number generators (PRNG) with low…
Expand
2014
2014
Performance Comparison Of Evolutionary Techniques Enhanced By Lozi Chaotic Map In The Task Of Reactor Geometry Optimization
Michal Pluhacek
,
R. Šenkeřík
,
I. Zelinka
,
D. Davendra
European Conference on Modelling and Simulation
2014
Corpus ID: 7477880
In this study the performance of two popular evolutionary computational techniques (particle swarm optimization and differential…
Expand
2013
2013
Efficient deterministic approximate counting for low-degree polynomial threshold functions
Anindya De
,
Rocco A. Servedio
Symposium on the Theory of Computing
2013
Corpus ID: 6049143
We give a deterministic algorithm for approximately counting satisfying assignments of a degree-d polynomial threshold function…
Expand
Highly Cited
2012
Highly Cited
2012
Emergence of Randomness from Chaos
R. Lozi
International Journal of Bifurcation and Chaos in…
2012
Corpus ID: 29280835
In systems theory and science, emergence is the way complex systems and patterns arise out of a multiplicity of relatively simple…
Expand
2010
2010
Cryptographically secure pseudo-random bit generator for RFID tags
Pedro Peris-López
,
E. S. Millán
,
J. Lubbe
,
L. Entrena
International Conference for Internet Technology…
2010
Corpus ID: 13567012
In RFID protocols, random numbers are mainly required to anonymize tag answers in order to guarantee the privacy of the owner of…
Expand
2006
2006
Cryptographically secure pseudorandom number generator
ガントマン、アレクサンダー
,
シャオ、ル
,
ローズ、グレゴリー・ゴードン
2006
Corpus ID: 64782777
The "quality" of the randomness required for these applications varies. For example creating a nonce in some protocols needs only…
Expand
Highly Cited
2004
Highly Cited
2004
Algebraic signatures for scalable distributed data structures
W. Litwin
,
T. Schwarz
Proceedings / International Conference on Data…
2004
Corpus ID: 9757504
Signatures detect changes to data objects. Numerous schemes are in use, especially the cryptographically secure standards SHA-1…
Expand
2003
2003
A cryptographically secure pseudorandom number generator
K. Aamodt
2003
Corpus ID: 122480433
Highly Cited
2000
Highly Cited
2000
Exposure-Resilient Functions and All-or-Nothing Transforms
R. Canetti
,
Y. Dodis
,
S. Halevi
,
E. Kushilevitz
,
A. Sahai
International Conference on the Theory and…
2000
Corpus ID: 6903660
We study the problem of partial key exposure. Standard cryptographic definitions and constructions do not guarantee any security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE