The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of counting the ones of a bit sequence (commonly known as the “popcount” function) is one of the most interesting problems in cryptography. Although it has received attention for a very long time, it was brought back into focus by the new developments in hardware, both for CPUs (SSE 4.2) and for GPUs. The problem is of special interest in the field of testing the quality of random sequences...
Unpredictable random number generators represent a suitable solution when sources of true randomness are not available, too expensive or the nature of the application employing the generator requires a higher throughput and practicality than available TRNGs might provide, but at the same time, the desired level of irreproducibility and unpredictability can not be met by pseudorandom generators. The...
Randomness comes in many flavours and has countless applications in various domains which state different quality requirements for the outcome of random number generators, therefore decisions on the suitability of a randomness generator for a specific application has to be made as a result of thorough analysis including the essential part of statistical testing. But as systems tend to consume increasingly...
Cryptographic algorithms are the fundamental building blocks of information security systems and their strength generally relies on the concept of computational complexity. But the process of increasing the computational effort needed by an adversary in order to break the provided security has a dramatic impact on the performance of the cryptographic application and sets a severe limit to the proposed...
As the need for high throughput and good quality random number generators is constantly increasing in security applications, the efforts for developing high performance generators must be combined with increasing the performance of the batteries of statistical tests that assess their quality.In order to increase the confidence in the random number generators, several randomness tests are applied on...
Collecting entropy from various sources available within a regular PC and combining them in an entropy pool is often used as an alternative to pseudo random number generation. Cheaper than using a hardware true random number generator (TRNG), this method offers a good approximation of a TRNG, commonly known as an unpredictable random number generator. The source of unpredictability is ultimately the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.