Regular ArticleDesign of Practical and Provably Good Random Number Generators☆,☆☆
References (52)
Realistic analysis of some randomized algorithms
J. Comput. System Sci.
(1991)- et al.
On the power of two point based sampling
J. Complexity
(1989) Riemann's hypothesis and tests for primality
J. Comput. System Sci.
(1976)Probabilistic algorithms for testing primality
J. Number Theory
(1980)- et al.
Practical and provable pseudorandom generators
5th Annual ACM–SIAM Symp. Disc. Alg.
(1995) - et al.
Deterministic simulation of logspace
19th Annual ACM Symp. Theory Computing
(1987) Eigenvalues and expanders
Combinatorica
(1986)- et al.
Simple constructions of almostk
31st Annual IEEE Symp. Found. Comp. Sci.
(1990) - et al.
Differential analysis of DES-like crypto system
Advances in Cryptology—CRYPTO90
(1990) - et al.
Comparison of two pseudorandom number generators
Advances in Cryptology—Crypto82
(1983)
How to generate cryptographically strong sequences of pseudorandom bits
SIAM J. Comput.
(1984)
Inferring sequences produced by pseudorandom number generators
J. Assoc. Comput. Mach.
(1989)
Spectral Graph Theory
(1997)
A probability inequality for the occupation measure of a reversible Markov chain
Ann. Appl. Probab.
(1995)
Monte Carlo simulations: Hidden errors from “good” random number generator
Phys. Rev. Lett.
(Dec. 1992)
Reconstructing truncated integer variables satisfying linear congruences
SIAM J. Comput.
(1988)
An efficient pseudorandom generator provably as secure as syndrome decoding
Advances in Cryptology, EUROCRYPT96
(1996)
Explicit constructions of linear-sized superconcentrators
J. Comput. System Sci.
(1981)
A Chernoff bound for random walks in expander graphs
IEEE Symp. Found. Comp. Sci.
(1993)
On the existence of pseudorandom generators
29th Annual IEEE Symp. Found. Computing
(1988)
Hard core bit for any one way function
J. Symbolic Logic
(1993)
Security preserving amplification of hardness
31st Annual IEEE Symp. Found. Comp. Sci.
(1990)
Pseudorandom generation from one-way functions
21st Annual ACM Symp. on Theory Computing
(1989)
Efficient cryptographic schemes provably as secure as subset sum
30th Annual IEEE Symp. Found. Comp. Sci.
(1989)
How to recycle random bits
IEEE Symp. Found. Comp. Sci.
(1989)
Cited by (0)
- ☆
A preliminary version of this work was presented at the Sixth 1–9).
- ☆☆
U. Maurer
- †
E-mail:[email protected].
- ‡
Work done while at Boston University Computer Science Department, and as a summer student at Bell Communications Research. E-mail:[email protected].
- §
Work done while at Bell Communications Research. E-mail:[email protected].
Copyright © 1998 Academic Press. All rights reserved.