Random Number Generators and Information Security
From Computing and Software Wiki
(Difference between revisions)
Line 17: | Line 17: | ||
== Conclusion == | == Conclusion == | ||
+ | == References == | ||
+ | == See Also == | ||
+ | == External Links == | ||
+ | --[[User:Caoff|Caoff]] 19:00, 1 December 2007 (EST) |
Revision as of 00:00, 2 December 2007
Contents |
Relevance to Information Security
Vulnerability
Two Kinds of Randomness
True Randomness
Physical Methods
Examples
Pros and Cons
Pseudo-Randomness
Computational Methods
Examples
Pros and Cons
Verdict
Conclusion
References
See Also
External Links
--Caoff 19:00, 1 December 2007 (EST)