Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/2323Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Bhardwaj, Trishansh | - |
| dc.contributor.author | Ankur and, Divyanjali | - |
| dc.date.accessioned | 2025-01-02T05:53:35Z | - |
| dc.date.available | 2025-01-02T05:53:35Z | - |
| dc.date.issued | 2015 | - |
| dc.identifier.citation | 10.1109/SPIN.2015.7095369 | en_US |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/2323 | - |
| dc.description | NITW | en_US |
| dc.description.abstract | Security over the network has become the most challenging issue with the day by day increase in use of internet and other such services provided by network. The secure transmission, storage and access of data or information are the key issues for security. To understand and implement security one needs to first know in deep the concept of pseudorandom numbers because they play a major role in internet security. Pseudo-random number generators are used to generate these numbers which can be then used as keys or in any other form. In this paper we have presented various pseudorandom number generators that are used for security purpose to generate the encryption keys, SSL connection, database security etc. There is a need to understand how and for what purpose these pseudorandom number generators can be used. We also elaborate some of the limitations of the same. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | 2nd International Conference on Signal Processing and Integrated Networks, SPIN 2015 | en_US |
| dc.subject | Random numbers | en_US |
| dc.subject | Lagged Fibonacci Generator | en_US |
| dc.title | A Dissection of Pseudorandom number Generators | en_US |
| dc.type | Other | en_US |
| Appears in Collections: | Computer Science & Engineering | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| A_dissection_of_pseudorandom_number_generators.pdf | 627.84 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.