[1]
|
P. L. Ecuyer and R. Panneton, “Fast Random Number Generators Based on Linear Recurrences Modulo 2: Overview and Comparison,” Proceedings of the Winter Simulation Conference, IEEE Press, Springer, New York, 2005, pp. 110-119. doi:10.1007/978-1-4419-1576-4
|
[2]
|
C. Robert and G. Casella, “Introducing Monte Carlo Methods with R,” Springer Textbook, New York, 2010.
|
[3]
|
B. Jun and P. Kocher, “The Intel Random Number Generator,” White Paper Prepared for Intel Corporation, California, April 1999, pp. 1-8.
|
[4]
|
L. Wang, F. -P. Wang and Z. -J. Wang, “Novel Chaos-Based Pseudo-Random Number Generator,” Acta Physica Sinica, Vol. 55, 2006, pp. 3964-3968.
|
[5]
|
S. Ergun and S. Ozoguz, “Truly Random Number Generators Based on a Non-Autonomous Chaotic Oscillator,” AEU-International Journal of Electronics & Communications, Vol. 61, No. 4, 2007, pp. 235-242.
doi:10.1016/j.aeue.2006.05.006
|
[6]
|
Y. Hu, X. Liao, K. -W. Wong and Q. Zhou, “A True Random Number Generator Based on Mouse Movement and Chaotic Cryptography,” Chaos Solitons and Fractals, Vol. 40, No. 5, 2009, pp. 2286-2293.
doi:10.1016/j.chaos.2007.10.022
|
[7]
|
V. Patidar, K. K. Sud and N. K. Pareek, “A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing,” Journal of Informatical, Vol. 1, No. 1-3, 2009, pp. 441-452.
|
[8]
|
B. Fechner and A. Osterloh, “A Meta-Level True Random Number Generator,” International Journal of Critical Computer-Based Systems, Vol. 1, No. 1-3, 2010, pp. 267-279. doi:10.1504/IJCCBS.2010.031719
|
[9]
|
I. Shparlinski, “On the Uniformity of Distribution of the Decryption Exponent in Fixed Encryption Exponent RSA,” Journal of Computation Theory and Mathematics, Vol. 92, No. 3, 2004, pp.143-147.
|
[10]
|
X. Wang and F. J. Hickernell, “Randomized Halton Sequences,” Journal of Mathematical and Computer Modelling, Vol. 32, 2000, pp. 2000.
|
[11]
|
P. Syam Kumar, R. Subramanian and D. Thamizh Selvam, “Ensuring Data Storage Security in Cloud Computing using Sobol Sequence,” 1st International Conference on Parallel, Distributed and Grid Computing, 2010, pp. 217-222.
|
[12]
|
H. Rahimov, M. Babaei and H. Hassanabadi, “Improving Middle Square Method RNG Using Chaotic Map,” Journal of Applied Mathematics, Vol. 2, No. 4, 2010, pp. 482-486.
|
[13]
|
M. Babaei and M. Ramyar, “Improved Performance of LFSR’s System with Discrete Chaotic Iterations,” World Applied Science Journal, Vol. 13, No. 7, 2011, pp. 1720-1725.
|
[14]
|
A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997.
|
[15]
|
B. Fechner and A. Osterloh, “A Meta-Level True Random Number Generator,” International Journal of Critical Computer-Based Systems, Vol. 1, No. 1-3, 2010, pp. 267-279. doi:10.1504/IJCCBS.2010.031719
|
[16]
|
B. D. McCullough, “A Review of TESTU01,” Journal of Applied Econometrics, Vol. 21, No. 5, 2006, pp. 677-682.
doi:10.1002/jae.917
|
[17]
|
NIST Special Publication 800-22, “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” October 2000.
|
[18]
|
M. L. uscher, “A Portable High-Quality Random Number Generator for Lattice ?eld Theory Simu-Lations,” Computer Physics Communications, Vol. 79, 1994, pp. 100-110.
|