2022
DOI: 10.1214/22-ss136
|View full text |Cite
|
Sign up to set email alerts
|

A brief and understandable guide to pseudo-random number generators and specific models for security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 154 publications
0
7
0
1
Order By: Relevance
“…Sequences with p-values greater or lower than these bounds were said to exhibit poor pseudorandomness [27,28]. At this point, we applied the Diehard battery of tests to a series of sequences generated using TinyJambu.…”
Section: The Diehard Battery Of Pseudorandomness Testsmentioning
confidence: 99%
See 1 more Smart Citation
“…Sequences with p-values greater or lower than these bounds were said to exhibit poor pseudorandomness [27,28]. At this point, we applied the Diehard battery of tests to a series of sequences generated using TinyJambu.…”
Section: The Diehard Battery Of Pseudorandomness Testsmentioning
confidence: 99%
“…In fact, the p-values may fluctuate but not trespass these bounds, indicating good statistical properties or good pseudorandomness characteristics. In this work, we established our boundaries in the following margins: 0.03 < p-values < 0.97 Sequences with p-values greater or lower than these bounds were said to exhibit poor pseudorandomness [27,28]. At this point, we applied the Diehard battery of tests to a series of sequences generated using TinyJambu.…”
mentioning
confidence: 99%
“…They are used in the field of statistics and cryptography. A paper that describes pseudo-random numbers and generation methods in-depth is [19].…”
Section: Classification Of Random Numbersmentioning
confidence: 99%
“…For such an encryption process, we require a lengthy bit of binary strings, coming from pseudo random binary sequence generators. These efficient generators are the necessary device for the privacy of the system [17,22]. The encryption and decryption, of such ciphers, are executed based on XOR operation with a lengthy key stream.…”
Section: Introductionmentioning
confidence: 99%