A Simple Unpredictable Pseudo-Random Number Generator

From MaRDI portal
Revision as of 10:41, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3738458

DOI10.1137/0215025zbMath0602.65002DBLPjournals/siamcomp/BlumBS86OpenAlexW2085759780WikidataQ55951424 ScholiaQ55951424MaRDI QIDQ3738458

Lenore Blum, Michael Shub

Publication date: 1986

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/cfeb641dc3b188e4e52c13f72ccb78170e98552c




Related Items (92)

On the cycle structure of repeated exponentiation modulo a primeRandom sequence generation by cellular automataAnother Look at TightnessLinear complexity of the \(x^{2} \bmod p\) orbitsReductions among number theoretic problemsA brief and understandable guide to pseudo-random number generators and specific models for securityOn the notion of infinite pseudorandom sequencesAll Bits in ax + b mod p are HardOn using deterministic functions to reduce randomness in probabilistic algorithmsMore efficient DDH pseudorandom generatorsData mining in electronic commerceGeneration of pseudo-random numbers with the use of inverse chaotic transformationAn improved BioHashing for human authenticationFeedback shift registers, 2-adic span, and combiners with memoryPower maps in finite groupsPerformance improvement for the GGM-construction of pseudorandom functionsEfficient cryptosystems from \(2^k\)-th power residue symbolsCycle structure of iterating Rédei functionsNew pseudo-random number generator based on improved discrete-space chaotic mapInferring sequences produced by elliptic curve generators using Coppersmith's methodsRSA and Elliptic Curve Least Significant Bit SecurityEfficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes AgainAre electroencephalogram (EEG) signals pseudo-random number generators?On the functional graph of the power map over finite groupsSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsImproving classical authentication over a quantum channelTIDE: a novel approach to constructing timed-release encryptionMore Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22On the power generator and its multivariate analogueImprovements on non-interactive zero-knowledge proof systems related to quadratic residuosity languagesDynamical analysis of a class of Euclidean algorithms.Paradigms for Unconditional Pseudorandom GeneratorsPseudorandom number generators based on random covers for finite groupsA comprehensive review of quantum random number generators: concepts, classification and the origin of randomnessApplications of timed-release encryption with implicit authenticationPractical chosen ciphertext secure encryption from factoringPredicting masked linear pseudorandom number generators over finite fieldsCertifying assembly with formal security proofs: the case of BBSSurvey on hardware implementation of random number generators on FPGA: theory and experimental analysesOn the uniformity of distribution of the RSA pairsRevisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter BoundsOn the iteration of certain quadratic maps over GF(\(p\)).Aligned Drawings of Planar GraphsThe graph structure of Chebyshev polynomials over finite fields and applicationsThe functional graph of linear maps over finite fields and applicationsIteration entropyOn the distribution of the power generatorPeriod of the power generator and small values of Carmichael’s functionLocal randomness in pseudorandom sequencesOn pseudorandomness in families of sequences derived from the Legendre symbolOn the linear complexity of some new \(q\)-ary sequencesTrace representation of some generalized cyclotomic sequences of length \(pq\)Coalgebra and abstractionSecure simultaneous bit extraction from Koblitz curvesQuantum attacks on pseudorandom generatorsA Calculus for Game-Based Security ProofsQUAD: A Practical Stream Cipher with Provable SecurityLinear complexity of Ding generalized cyclotomic sequencesDeterministic Encryption: Definitional Equivalences and Constructions without Random OraclesRealistic analysis of some randomized algorithmsNew concepts and construction of quantum random number generatorsConstructing digitized chaotic time series with a guaranteed enhanced periodOn the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptographyQUAD: A multivariate stream cipher with provable securitySession resumption protocols and efficient forward security for TLS 1.3 0-RTTCryptographic hardness for learning intersections of halfspacesUniform random number generationPractical Chosen Ciphertext Secure Encryption from FactoringComparative Analysis of Random GeneratorsLinear complexity of generalized cyclotomic binary sequences of order 2A generalized scheme for data encryption technique using a randomized matrix keyBuilding Secure Block Ciphers on Generic Attacks AssumptionsA Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom GeneratorsAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliSome remarks on FCSRs and implications for stream ciphersAn overview of distinguishing attacks on stream ciphersDistributional properties of \(d\)-FCSR sequencesSynthesizers and their application to the parallel construction of pseudo-random functionsQuantum Hardness of Learning Shallow Classical CircuitsKey Refreshing in Wireless Sensor NetworksCryptography Based on Quadratic Forms: Complexity ConsiderationsAn efficient binary sequence generator with cryptographic applicationsProbabilistic encryptionFormal security proofs with minimal fuss: implicit computational complexity at workSide channel cryptanalysis of product ciphersHow to Exchange Half a BitLittle extension of Euler's criterion for quadratic residueThe discrete logarithm modulo a composite hides \(O(n)\) bitsEfficient, perfect polynomial random number generatorsA comparison of two approaches to pseudorandomnessTwo variants of Lempel - Ziv test for binary sequencesOn the distribution of the Diffie-Hellman pairs







This page was built for publication: A Simple Unpredictable Pseudo-Random Number Generator