How to Use Pseudorandom Generators in Unconditional Security Settings.
Koji NuidaPublished in: ProvSec (2014)
Keyphrases
- pseudorandom
- random numbers
- stream cipher
- encryption algorithm
- secret key
- random number
- uniformly distributed
- security level
- information security
- security policies
- computer security
- access control
- intrusion detection
- security issues
- key management
- security threats
- network security
- security problems
- security measures
- high security
- statistical databases
- data sets
- security requirements
- smart card
- rfid tags
- lightweight