Nyo, Aye Myat
(Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
Many cryptographic protocols require
random or pseudorandom inputs at various
points (e.g., for generating digital signatures, or
in some authentication protocols).
Pseudorandom numbers are critical part of
modern ...