Skip to search formSkip to main contentSkip to account menu

Random number generator attack

Known as: RNG attack 
The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Embedded microprocessors are commonly used for future technologies such as Internet of Things(IoT), RFID and Wireless Sensor… 
Review
2010
Review
2010
Wireless networks are popular among the Laptop user community today because of the mobility and ease of use. People working… 
2005
2005
The Army's next generation distributed sensor networks provide stand-off situational awareness for future troops. A major factor… 
2003
2003
  • L. Hui
  • 2003
  • Corpus ID: 115474589
The key generation module is the most secret component of a cryptosystem. Keys are generated using random number generators (RNGs… 
2000
2000
This paper has been withdrawn by the author(s), 
1995
1995
SYNOPTIC ABSTRACTPrevious work has shown how to test a simple hypothesis of uniformity on the interval (0, 1) by using spacings… 
1985
1985
A recently proposed test for uniform random number generators is based on the mean and variance of the outcome of a sequence of… 
1979
1979
Abstract : In the problem under consideration a decision maker has a total of M candidates to interview sequentially. The… 
1973
1973
Abstract : Several widely used uniform random number generators have been extensively subjected to three commonly used…