Farajallah, Mousa
(JATIT, 2018-04-15)
Many security applications are based on Pseudo Random Number Generators (PRNGs). Random binary
numbers constitute a major reliance in many network security algorithms. For example, common
cryptosystems require a long ...