Skip to search formSkip to main contentSkip to account menu

Random number generator attack

Known as: RNG attack 
The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Printed electronics (PE) is a fast growing technology with promising applications in wearables, smart sensors and smart cards… 
2011
2011
An efficient hardware implementation of Gaussian Random Number (GRN) generator based on Central Limit Theorem (CLT) is presented… 
2007
2007
Implementations of a thermal noise and a chaotic True Random Number Generator (TRNG) are presented. They are embedded in a large… 
Review
2005
Review
2005
Random number generators based on linear recurrences modulo 2 are among the fastest long-period generators currently available… 
2004
2004
Following the analysis of generating random number using piecewise chaotic map, a structure of chaos based random number… 
2000
2000
We study statistical tests of uniformity based on theL p -distances between them nearest pairs of points, forn points generated… 
1995
1995
We present a construction for a family of pseudo-random generators that are very fast in practice, yet possess provable… 
1985
1985
A recently proposed test for uniform random number generators is based on the mean and variance of the outcome of a sequence of… 
1973
1973
Abstract : Several widely used uniform random number generators have been extensively subjected to three commonly used… 
1972
1972
The work of A. Wald [11] and H. Robbins [10] played an important role in stimulating interest in the investigation of sums of a…