Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2323
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhardwaj, Trishansh-
dc.contributor.authorAnkur and, Divyanjali-
dc.date.accessioned2025-01-02T05:53:35Z-
dc.date.available2025-01-02T05:53:35Z-
dc.date.issued2015-
dc.identifier.citation10.1109/SPIN.2015.7095369en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/2323-
dc.descriptionNITWen_US
dc.description.abstractSecurity over the network has become the most challenging issue with the day by day increase in use of internet and other such services provided by network. The secure transmission, storage and access of data or information are the key issues for security. To understand and implement security one needs to first know in deep the concept of pseudorandom numbers because they play a major role in internet security. Pseudo-random number generators are used to generate these numbers which can be then used as keys or in any other form. In this paper we have presented various pseudorandom number generators that are used for security purpose to generate the encryption keys, SSL connection, database security etc. There is a need to understand how and for what purpose these pseudorandom number generators can be used. We also elaborate some of the limitations of the same.en_US
dc.language.isoenen_US
dc.publisher2nd International Conference on Signal Processing and Integrated Networks, SPIN 2015en_US
dc.subjectRandom numbersen_US
dc.subjectLagged Fibonacci Generatoren_US
dc.titleA Dissection of Pseudorandom number Generatorsen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
A_dissection_of_pseudorandom_number_generators.pdf627.84 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.