Skip to search formSkip to main contentSkip to account menu

Random number generator attack

Known as: RNG attack 
The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Printed electronics (PE) is a fast growing technology with promising applications in wearables, smart sensors and smart cards… 
2016
2016
Random number generators (RNGs) play an important role in many real-world applications. Besides true hardware RNGs, one important… 
2011
2011
An efficient hardware implementation of Gaussian Random Number (GRN) generator based on Central Limit Theorem (CLT) is presented… 
2008
2008
FPGA based implementations of two classes of pseudo random number(PRN) generator, intended for use in Monte Carlo methods for… 
2004
2004
Following the analysis of generating random number using piecewise chaotic map, a structure of chaos based random number… 
2000
2000
We study statistical tests of uniformity based on theL p -distances between them nearest pairs of points, forn points generated… 
1995
1995
We present a construction for a family of pseudo-random generators that are very fast in practice, yet possess provable… 
1985
1985
A recently proposed test for uniform random number generators is based on the mean and variance of the outcome of a sequence of… 
1973
1973
Abstract : Several widely used uniform random number generators have been extensively subjected to three commonly used… 
1972
1972
The work of A. Wald [11] and H. Robbins [10] played an important role in stimulating interest in the investigation of sums of a…