Sciweavers

CORR
2004
Springer
92views Education» more  CORR 2004»
14 years 8 days ago
Pseudorandom number generation by p-adic ergodic transformations: an addendum
Abstract. The paper study counter-dependent pseudorandom number generators based on m-variate (m > 1) ergodic mappings of the space of 2-adic integers Z2. The sequence of intern...
Vladimir Anashin
JUCS
2006
114views more  JUCS 2006»
14 years 12 days ago
Pseudorandom Number Generation: Impossibility and Compromise
Abstract: Pseudorandom number generators are widely used in the area of simulation. Defective generators are still widely used in standard library programs, although better pseudor...
Makoto Matsumoto, Mutsuo Saito, Hiroshi Haramoto, ...
ADHOCNOW
2009
Springer
14 years 1 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
USS
2008
14 years 2 months ago
In Defense of Pseudorandom Sample Selection
Generation of random numbers is a critical component of existing post-election auditing techniques. Recent work has largely discouraged the use of all pseudorandom number generato...
Joseph A. Calandrino, J. Alex Halderman, Edward W....
FOCS
1995
IEEE
14 years 4 months ago
Pseudorandom Generators, Measure Theory, and Natural Proofs
We prove that if strong pseudorandom number generators exist, then the class of languages that have polynomialsized circuits (P/poly) is not measurable within exponential time, in...
Kenneth W. Regan, D. Sivakumar, Jin-yi Cai
COMPGEOM
2000
ACM
14 years 4 months ago
Pitfalls in computing with pseudorandom determinants
It has been known for 30 years that pseudorandom number generators in the class of linear congruential generators (LCG) exhibit strong and predictable regularities. A widely used ...
Bernd Gärtner
WISA
2005
Springer
14 years 6 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...