Non-Binary Pseudorandom Number Generators For Information Security Purposes.
M. A. IvanovE. B. RoslyjA. V. StarikovskiySvetlana A. KrasnikovaN. A. ShevchenkoL. I. ShustovaPublished in: BICA (2017)
Keyphrases
- information security
- pseudorandom number
- non binary
- constraint satisfaction problems
- chaotic map
- security issues
- network security
- intrusion detection
- smart card
- information systems
- frequent pattern mining
- information security management
- arc consistency
- constraint satisfaction
- hash functions
- piecewise linear
- e government
- security requirements
- hidden variables
- image encryption
- knowledge management