Random Number Generators and Information Security
From Computing and Software Wiki
Contents |
Relevance to Information Security
Vulnerability
Two Kinds of Randomness
True Randomness
Physical Methods
Examples
Pros and Cons
Pseudo-Randomness
Computational Methods
Examples
Pros and Cons
Verdict
Conclusion
References
See Also
External Links
--Caoff 19:00, 1 December 2007 (EST)