Author:
Ustimenko Vasyl,Chojecki Tymoteusz
Publisher
Springer Nature Switzerland
Reference27 articles.
1. Schneier, B.: Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C. Wiley 784 p.
2. Boneh, D., Shoup, V.: A Graduate Course in Applied Cryptography, Stanford University, free on-line course
3. Easttom, W.: Random number generators. In: Easttom, W. (ed.) Modern Cryptography: Applied Mathematics for Encryption and Information Security, pp. 257–276. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-63115-4_12
4. Grozov, V., Guirik, A., Budko, M., Budko, M.: Development of a Pseudo-Random Sequence Generation Function Based on the Cryptographic Algorithm “Kuznechik.” Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2020), Czech Republic, pp. 93–98 (2020). https://doi.org/10.1109/ICUMT51630.2020.9222457
5. Balková, Ľ, Bucci, M., De Luca, A., Hladký, J., Puzynina, S.: Aperiodic pseudorandom number generators based on infinite words. Theor. Comput. Sci. 647, 85–100 (2016). https://doi.org/10.1016/j.tcs.2016.07.042