"
Introduction to Secure PRNGs"
written by Majid Babaei, Mohsen Farhadi,
published by
International Journal of Communications, Network and System Sciences,
Vol.4 No.10, 2011
has been cited by the following article(s):
[1]
|
Investigation of Strength and Security of Pseudo Random Number Generators
IOP Conference Series: Materials Science and Engineering,
2021
DOI:10.1088/1757-899X/1055/1/012076
|
|
|
[2]
|
Performance of Finite Precision on Discrete Chaotic Map Based on a Feedback Shift Register
Complexity,
2020
DOI:10.1155/2020/4676578
|
|
|
[3]
|
Study for Randomness of Diverse Pseudo-Random Bit Generators Oriented to Telecommunication Applications
2019 14th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS),
2019
DOI:10.1109/TELSIKS46999.2019.9002014
|
|
|
[4]
|
Biometric signcryption using hyperelliptic curve and cryptographically secure random number
2016 International Conference on Recent Trends in Information Technology (ICRTIT),
2016
DOI:10.1109/ICRTIT.2016.7569557
|
|
|
[5]
|
A General Evaluation Pattern for Pseudo Random Number Generators
Trends in Applied Sciences Research,
2015
DOI:10.3923/tasr.2015.231.244
|
|
|
[6]
|
PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks
Sensors,
2015
DOI:10.3390/s151026251
|
|
|
[7]
|
Random number generation based on sensor with decimation method
2015 IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI),
2015
DOI:10.1109/WCI.2015.7495500
|
|
|
[8]
|
A novel text and image encryption method based on chaos theory and DNA computing
Natural Computing,
2013
DOI:10.1007/s11047-012-9334-9
|
|
|