КНИГИ НА АНГЛИЙСКИЙ ЯЗЫКЕ, ИМЕЮЩЕЕ ОТНОШЕНИЕ К СЛОВУ «PSEUDORANDOM»
Поиск случаев использования слова
pseudorandom в следующих библиографических источниках. Книги, относящиеся к слову
pseudorandom, и краткие выдержки из этих книг для получения представления о контексте использования этого слова в литературе на английский языке.
1
Built-in test for VLSI:
pseudorandom techniques
This handbook provides ready access to all of the major concepts, techniques, problems, and solutions in the emerging field of pseudorandom pattern testing.
Paul H. Bardell, William H. McAnney, Jacob Savir, 1987
2
A Primer on
Pseudorandom Generators
That is, the (feasible) testing procedure is given oracle access to the function (but
not its explicit description), and cannot distinguish the case when it is given
oracle access to a pseudorandom function from the case when it is given oracle ...
3
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
Then is a pseudorandom generator (with stretch function f), where /,+1(x) = f(fl(x))
and f°(x) = x. As a concrete example, consider the permutation x i— > x2 mod N,
where N is the product of two primes each congruent to 3 (mod 4). We have ...
4
Monte Carlo and Quasi-Monte Carlo Methods 1996: Proceedings ...
This review paper deals with nonlinear methods for the generation of uniform
pseudorandom numbers in the unit interval. The emphasis is on results of the
theoretical analysis of quadratic congruential and (recursive) inversive
congruential ...
Harald Niederreiter, 1998
5
Discrete Mathematics with Proof
Pseudorandom. Numbers. Computers are often used to simulate real- world
events. For example, a store might wish to simulate a typical business day and
experiment with how many checkout lines to have open at various times during
the ...
6
Algorithms for Parallel Processing
SOME METHODS OF PARALLEL PSEUDORANDOM NUMBER GENERATION
MICHAEL MASCAGNI* Abstract. We detail several methods used in the
production of pseudorandom numbers for scalable systems. We will focus on
methods ...
Michael T. Heath, Abhiram Ranade, Robert S. Schreiber, 1999
7
Introduction to Modern Cryptography: Principles and Protocols
Pseudorandom generators from one-way permutations. The next step is to show
how the hard-core predicate of a one-way permutation can be used to construct a
pseudorandom generator. (It is known that one-way functions suffice for ...
Jonathan Katz, Yehuda Lindell, 2007
8
The Forrest Mims Circuit Scrapbook
This LED-flasher application illustrates how the circuit can be used to strobe (
actuate) another circuit at a pseudorandom rate. As you alter the clock rate or
change the connections to the shift registers, the pseudorandom sequence
generator ...
9
Foundations of Cryptography: Volume 1, Basic Tools
In this chapter we discuss pseudorandom generators. Loosely speaking, these
are efficient deterministic programs that expand short, randomly selected seeds
into much longer “pseudorandom” bit sequences (see illustration in Figure 3.1).
10
Statistical Methods for Reliability Data
4.13 GENERATING PSEUDORANDOM OBSERVATIONS FROM A SPECIFIED
DISTRIBUTION Simulation (or Monte Carlo simulation) methods are becoming
increasingly important for many applications of statistics and, indeed. quantitative
...
William Q. Meeker, Luis A. Escobar, 1998
НОВОСТИ, В КОТОРЫХ ВСТРЕЧАЕТСЯ ТЕРМИН «PSEUDORANDOM»
Здесь показано, как национальная и международная пресса использует термин
pseudorandom в контексте приведенных ниже новостных статей.
PseudoRandom object placement
Im currently playing with procedural map generation working with a SEED for generation, my map works with perlin noise and it has humidity, elevation, biomes ... «GameDev.net, Июн 15»
Crypto Calamity for Blockchain Android App
A threat on the Bitcoin subreddit pins the blame on vulnerabilities in the Blockchain pseudorandom number generator (PRNG) called RandomOrgGenerator. «Threatpost, Май 15»
Hunting for Random: The Quest to Find Numbers That Keep Your …
The problem is that the list is already pre-determined. It's what experts call pseudorandom. If you were using these numbers for your secure ID and anybody ... «Gizmodo, Мар 15»
All WordPress Websites at Risk, No CSPRNG Available
An attacker may be able to take complete control of a WordPress website due to lack of a cryptographically secure pseudorandom number generator (CSPRNG). «Softpedia, Фев 15»
UTSA partners to deliver software tools for high performance …
based Silicon Informatics Inc. has yielded the delivery of a pair of highly flexible, scalable high performance computing (HPC) software tools: the pseudorandom ... «UTSA Today, Фев 15»
Software Patent Survives Motion to Dismiss in Northern District of …
But in step two, she noted that the diagrams and specification included a major limitation on the patent's scope: the inclusion of pseudorandom tag generating ... «Valpo Today, Окт 14»
The OpenSSL software bug that saves you from surveillance!
Three of NIST's DRBGs are conventional: two of them use cryptographic hashes internally to mash up a soup of pseudorandom bits, while the third uses a ... «Naked Security, Дек 13»
Java pseudorandom number generator sows seed of BitCoin …
It seems the problem lies with use of pseudorandom number generators. Specifically, applications using the Java Cryptography Architecture (JCA) for key ... «ElectronicsWeekly.com, Авг 13»
Pseudo random domain name generation and Blackhole
Pseudorandom domain name generation and the Blackhole exploit kit .... 3 Responses to Pseudorandom domain name generation and the Blackhole exploit kit. «Naked Security, Июл 12»
Codes: The PRN Family Grows Again
Unlike most families that become more robust the more the members have in common with each other, pseudorandom noise families grow stronger the more ... «Inside GNSS, Сен 11»