Sciweavers

96
Voted
CORR
2004
Springer
92views Education» more  CORR 2004»
15 years 2 days ago
Pseudorandom number generation by p-adic ergodic transformations: an addendum
Abstract. The paper study counter-dependent pseudorandom number generators based on m-variate (m > 1) ergodic mappings of the space of 2-adic integers Z2. The sequence of intern...
Vladimir Anashin
120
Voted
JUCS
2006
114views more  JUCS 2006»
15 years 5 days ago
Pseudorandom Number Generation: Impossibility and Compromise
Abstract: Pseudorandom number generators are widely used in the area of simulation. Defective generators are still widely used in standard library programs, although better pseudor...
Makoto Matsumoto, Mutsuo Saito, Hiroshi Haramoto, ...
116
Voted
ADHOCNOW
2009
Springer
15 years 1 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
78
Voted
USS
2008
15 years 2 months ago
In Defense of Pseudorandom Sample Selection
Generation of random numbers is a critical component of existing post-election auditing techniques. Recent work has largely discouraged the use of all pseudorandom number generato...
Joseph A. Calandrino, J. Alex Halderman, Edward W....
101
Voted
FOCS
1995
IEEE
15 years 3 months ago
Pseudorandom Generators, Measure Theory, and Natural Proofs
We prove that if strong pseudorandom number generators exist, then the class of languages that have polynomialsized circuits (P/poly) is not measurable within exponential time, in...
Kenneth W. Regan, D. Sivakumar, Jin-yi Cai
82
Voted
COMPGEOM
2000
ACM
15 years 4 months ago
Pitfalls in computing with pseudorandom determinants
It has been known for 30 years that pseudorandom number generators in the class of linear congruential generators (LCG) exhibit strong and predictable regularities. A widely used ...
Bernd Gärtner
97
Voted
WISA
2005
Springer
15 years 5 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...