Random Number Generators for Computer Simulation and Cyber Security : Design, Search, Theory, and Application - Lih-Yuan Deng

Random Number Generators for Computer Simulation and Cyber Security

Design, Search, Theory, and Application

By: Lih-Yuan Deng, Nirman Kumar, Henry Horng-Shing Lu, Ching-Chi Yang

eText | 7 March 2025

At a Glance

eText


$64.99

or 4 interest-free payments of $16.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book discusses the theory and practice of random number generators that are useful for computer simulation and computer security applications. Random numbers are ubiquitous in computation. They are used in randomized algorithms to perform sampling or choose randomly initialized parameters or perform Markov Chain Monte Carlo (MCMC). They are also used in computer security applications for various purposes such as cryptographic nuances or in authenticators. In practice, the random numbers used by any of these applications are from a pseudo-random sequence. These pseudo-random sequences are generated by RNGs (random number generators). This book discusses the theory underlying such RNGs, which are used by all programmers. However, few try to understand the theory behind them. This topic is an active area of research, particularly when the generators are used for cryptographic applications. The authors introduce readers to RNGs, how they are judged for quality, the mathematical and statistical theory behind them, as well as provide details on how these can be implemented in any programming language. The book discusses non-linear transformations that use classical linear generators for cryptographic applications and how to optimize to make such generators more efficient. In addition, the book provides up-to-date research on RNGs including a modern class of efficient RNGs and shows how to search for new RNGs with good quality and how to parallelize these RNGs.

on
Desktop
Tablet
Mobile

More in Computer Science

Amazon.com : Get Big Fast - Robert Spector

eBOOK