• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 669
Next 10 →

On Pseudorandom Generators with 0 ⋆ Linear Stretch in NC

by Yuval Ishai, Eyal Kushilevitz
"... Abstract. We consider the question of constructing cryptographic pseudorandom generators (PRGs) in NC 0, namely ones in which each bit of the output depends on just a constant number of input bits. Previous constructions of such PRGs were limited to stretching a seed of n bits to n + o(n) bits. This ..."
Abstract - Add to MetaCart
Abstract. We consider the question of constructing cryptographic pseudorandom generators (PRGs) in NC 0, namely ones in which each bit of the output depends on just a constant number of input bits. Previous constructions of such PRGs were limited to stretching a seed of n bits to n + o(n) bits

A Collection of Selected Pseudorandom Number Generators with Linear Structures

by Karl Entacher , 1997
"... This is a collection of selected linear pseudorandom number that were implemented in commercial software, used in applications, and some of which have extensively been tested. The quality of these generators is examined using scatter plots and the spectral test. In addition, the spectral test is app ..."
Abstract - Cited by 14 (2 self) - Add to MetaCart
This is a collection of selected linear pseudorandom number that were implemented in commercial software, used in applications, and some of which have extensively been tested. The quality of these generators is examined using scatter plots and the spectral test. In addition, the spectral test

Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications

by Xiaoming Hu , Wenan Tan , Huajie Xu , Jian Wang , Chuang Ma , Muhammad Khurram Khan
"... Most of the strong designated verifier signature (SDVS) schemes cannot tell the real signature generator when the signer and the designated verifier dispute on a signature. In other words, most of the SDVS schemes do not have the undeniability property. In this paper, we propose two SDVS schemes wh ..."
Abstract - Add to MetaCart
Most of the strong designated verifier signature (SDVS) schemes cannot tell the real signature generator when the signer and the designated verifier dispute on a signature. In other words, most of the SDVS schemes do not have the undeniability property. In this paper, we propose two SDVS schemes

Applications of Pseudorandom Binary Sequences Generated by One-dimensional Discrete-time Maps

by Dejan Djonin
"... Abstract: Inspired by recently reported applications of chaotic dynamical systems in encryption and asynchronous DS-CDMA systems [1], as well as our prior study of properties of non-linear maps [2], we present two new improved methods for generation of error-correction codes by iteration of one-dime ..."
Abstract - Add to MetaCart
Abstract: Inspired by recently reported applications of chaotic dynamical systems in encryption and asynchronous DS-CDMA systems [1], as well as our prior study of properties of non-linear maps [2], we present two new improved methods for generation of error-correction codes by iteration of one

Pseudorandom walks on regular digraphs and the RL vs. L problem

by Omer Reingold, Luca Trevisan, Salil Vadhan - In Proceedings of the 38th Annual ACM Symposium on Theory of Computing (STOC ‘06 , 2006
"... We revisit the general RL vs. L question, obtaining the following results. 1. Generalizing Reingold’s techniques to directed graphs, we present a deterministic, log-space algorithm that given a regular (or, more generally, Eulerian) directed graph G and two vertices s and t, finds a path between s a ..."
Abstract - Cited by 20 (2 self) - Add to MetaCart
s and t if one exists. 2. If we restrict ourselves to directed graphs that are regular and consistently labelled, then we are able to produce pseudorandom walks for such graphs in logarithmic space (this result already found an independent application). 3. We prove that if (2) could be generalized to all regular

An application of finite field: Design and implementation of 128-bit instruction-based fast pseudorandom number generator

by Mutsuo Saito , 2007
"... (1) SIMD-oriented Mersenne Twister (SFMT) is a new pseudorandom number generator (PRNG) which uses 128-bit Single Instruction Multiple Data (SIMD) operations. SFMT is designed and implemented on C language with SIMD extensions and also implemented on standard C without SIMD. (2) Properties of SFMT a ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
(1) SIMD-oriented Mersenne Twister (SFMT) is a new pseudorandom number generator (PRNG) which uses 128-bit Single Instruction Multiple Data (SIMD) operations. SFMT is designed and implemented on C language with SIMD extensions and also implemented on standard C without SIMD. (2) Properties of SFMT

An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation

by Ivan Damgård, Jesper Buus Nielsen , 2001
"... We present a pseudo-random bit generator expanding a uniformly random bitstring r of length k/2, where k is the security parameter, into a pseudo-random bit-string of length 2k - log 2 (k) using one modular exponentiation. In contrast to all previous high expansion-rate pseudo-random bit genera ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
generators, no hashing is necessary. The security of the generator is proved relative to Paillier's composite degree residuosity assumption. As a first application of our pseudo-random bit generator we exploit its e#ciency to optimise Paillier's crypto-system by a factor of (at least) 2 in both

Run Test of Pseudo-Random Numbers Generated by Chaotic Maps

by Yuki Nakaaji, Shuichi Aono, Yoshifumi Nishio
"... Pseudo-random numbers are useful for wide-ranging ap-plications [1][2]. However, it is not easy to generate truely random numbers. There are several tests to investigate the randomness of limited amount of numbers; the frequency test, ..."
Abstract - Add to MetaCart
Pseudo-random numbers are useful for wide-ranging ap-plications [1][2]. However, it is not easy to generate truely random numbers. There are several tests to investigate the randomness of limited amount of numbers; the frequency test,

Lamar: A New Pseudorandom Number Generator Evolved by means of Genetic Programming

by Carlos Lamenca-martinez, Julio Cesar Hern, Juan M. Estevez-tapiador, Arturo Ribagorda
"... Abstract. Pseudorandom number generation is a key component of many Computer Science algorithms, including mathematical modeling, stochastic processes, Monte Carlo simulations, and most cryptographic primitives and protocols. To date, multiple approaches that use Evolu-tionary Computation (EC) techn ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
) techniques have been proposed for design-ing useful Pseudorandom Number Generators (PRNGs) for certain non-cryptographic applications. However, none of the proposals have been secure nor efficient enough to be of interest for the much more demand-ing crypto world. In this work, we present a general scheme

Pseudo-Random Modulation of a Laser Diode for Generation Ultrasonic

by Eric I. Madaras, Robert F. Anastasi - Longitudinal Waves,” 26 th Annual Review of Progress in Qualitative Nondestructive Evaluation , 1999
"... INTRODUCTION Laser generated ultrasound systems have historically been more complicated and expensive than conventional piezoelectric based systems, and this fact has relegated the acceptance of laser based systems to niche applications for which piezoelectric based systems are less suitable. Loweri ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
INTRODUCTION Laser generated ultrasound systems have historically been more complicated and expensive than conventional piezoelectric based systems, and this fact has relegated the acceptance of laser based systems to niche applications for which piezoelectric based systems are less suitable
Next 10 →
Results 21 - 30 of 669
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University