Генератори псевдовипадкових чисел, їх застосування, класифікація, основні методи побудови і оцінка якості
DOI:
https://doi.org/10.18372/2410-7840.5.4270Abstract
В роботі розглядаються генератори псевдовипадкових чисел, їх застосування, класифікація та основні методи побудови і оцінки якості.References
Анин Б.Ю. Защита компьютерной информации. — СПб.: БХВ-Петербург, 2000. — 384 с.: ил.
Random Numbers in Data Security Systems. Intel Random Number Generator. Scott Durrant. Intel Corporation 1999.
Оберман P.M.M. Счет и счетчики: Пер. с англ. - М.: Радио и связь, 1984. - 176 с:,
ил.
Левченко В.Ф. Модели в теории биологической эволюции Автореферат диссертации на соискание ученой степени доктора биологических наук в форме научного доклада Санкт-Петербург 1998.
Characterization of a Pseudo-Random Testing Technique for Analog and Mixed-Signal Bult-In-Self-Test. Jan Arlid Tofte, Chee-Kian Ong, Juin-Lang Huang, Kwang-Ting (Tim) Cheng. Department of Electrical and Computer Engineering, Univ. Of California, Santa Barbara, CA, US.
Experimental Modal Analysis. Brian Schwarz & Mark H. Richardson, Vibrant Technology, Inc. Jamestown, California 95327, October, 1999.
Mixed-Signal Testing of Integreted Analog Circuits and Electronic Modules, A Dissertation Presented to the Faculty of the Fritz J. and Dolores H.Russ College of Engineering and technology Ohio University In partial Fulfillment of the Requirement for the Degree Doctor of Philosophy by Zhi-Hong Liu, March 20, 1999.
Products of Random Matrices in Control and Signal Processing. Jelel EZZINE. ACS, ENIT. Campus Universitaire, BP 37 Те Belvedere, Tunis, TUNISIA.
Spherical Pseudo-Random Pattern Testing. Malgorzata Marek-Sadowska. Electrical and Computer Engineering Department University of California, Santa Barbara, CA 93106. Final Report 1997-98 for MICRO Project 97-109.
Гундарь К.Ю., Гундарь А.Ю., Янишевский Д.А.. Защита информации в компьютерных системах - К.: "Корнейчук", 2000. - 152с.. ил.
Романеи Ю.В., Тимофеев П.А., Шаньгин В.Ф. Защита информации в компьютерных системах и сетях / Под ред. В.Ф. Шаньгина. - 2-е изд., перераб. И доп. - М.: Радио и связь, 2001. - 376 е.: ил.
Bluetooth Security. Juha Т. Vainio, Department of Computer Science and Engineering Helsinki University of Technology, 2000.
Cryptanalytic Attacks on Pseudorandom Number Generators. John Kelsey, Bruce Schneier, David Wagner, Chris Hall. Fast Software Encryption, Fifth International Workshop Proceedings (March 1998), Springer-Verlag, 1998, pp. 168-188.
M. Blum, S.Micali. How to generate cryptographically Strong sequences of pseudo¬random bits// SI AM J. Comput., vol.13, no.4, 1984, pp.850-864.
Randomness Recommendations for Security. D. East lake, 3rd DEC S.Crocker Cybercash, J.Schiller MIT, December 1994.
Кнут Д. Искусство программирования для ЭВМ: В 3-х т. Получисленные алгоритмы. Пер. с англ. - М.: Мир, 1977. - Т.2. - 724 с.
Hardware-based Random Number Generation, An RSA Data Security While Paper, RSA Data Security, Inc. 1999.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).