Login / Signup
Log-Seed Pseudorandom Generators via Iterated Restrictions.
Dean Doron
Pooya Hatami
William Hoza
Published in:
Electron. Colloquium Comput. Complex. (2019)
Keyphrases
</>
pseudorandom
random numbers
random number
uniformly distributed
secret key
encryption algorithm
co occurrence
stream cipher
log log
database
neural network
data mining
smart card