Using Linear Congruential Generators for Cryptographic Purposes
暂无分享,去创建一个
[1] Bruce Schneier,et al. Practical cryptography , 2003 .
[2] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[3] Donald E. Knuth,et al. Deciphering a linear congruential encryption , 1985, IEEE Trans. Inf. Theory.
[4] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.
[5] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[6] Hugo Krawczyk. How to Predict Congruential Generators , 1992, J. Algorithms.
[7] Bo Sun,et al. Security evaluation of email encryption using random noise generated by LCG , 2005 .
[8] Terry Ritter. The Efficient Generation of Cryptographic Confusion Sequences , 1991, Cryptologia.
[9] Joan Boyar,et al. Inferring sequences produced by pseudo-random number generators , 1989, JACM.
[10] S. K. Park,et al. Random number generators: good ones are hard to find , 1988, CACM.
[11] Donald Ervin Knuth,et al. The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .
[12] Karl Entacher,et al. A Collection of Selected Pseudorandom Number Generators With Linear Structures , 1997 .
[13] J. Boyar. Inferring a Sequence Generated by a Linear Congruence , 1982, FOCS.