Torrent details for "Deng L. Random Number Generators for Computer Simulation and Cyb…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
21.7 MB
Info Hash:
71B4D3DFD95666B349A12F8C161D306897C704C9
Added By:
Added:
April 20, 2026, 4:31 a.m.
Stats:
|
(Last updated: April 20, 2026, 4:36 a.m.)
| File | Size |
|---|---|
| Deng L. Random Number Generators for Computer Simulation and Cyber Security.2025.pdf | 5.5 MB |
| Fraga de la L. Random Number Generators. Verilog Description,..Applications 2025.pdf | 16.2 MB |
Name
DL
Uploader
Size
S/L
Added
-
568.1 MB
[30
/
42]
2026-03-27
| Uploaded by XXXClub | Size 568.1 MB | Health [ 30 /42 ] | Added 2026-03-27 |
NOTE
SOURCE: Deng L. Random Number Generators for Computer Simulation and Cyber Security.2025
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format This book discusses the theory and practice of random number generators that are useful for computer simulation and computer security applications. Random numbers are ubiquitous in computation. They are used in randomized algorithms to perform sampling or choose randomly initialized parameters or perform Markov Chain Monte Carlo (MCMC). They are also used in computer security applications for various purposes such as cryptographic nuances or in authenticators. In practice, the random numbers used by any of these applications are from a pseudo-random sequence. These pseudo-random sequences are generated by RNGs (random number generators). This book discusses the theory underlying such RNGs, which are used by all programmers. However, few try to understand the theory behind them. This topic is an active area of research, particularly when the generators are used for cryptographic applications. The authors introduce readers to RNGs, how they are judged for quality, the mathematical and statistical theory behind them, as well as provide details on how these can be implemented in any programming language. The book discusses non-linear transformations that use classical linear generators for cryptographic applications and how to optimize to make such generators more efficient. In addition, the book provides up-to-date research on RNGs including a modern class of efficient RNGs and shows how to search for new RNGs with good quality and how to parallelize these RNGs
×


