| 1. | Method of generating long period pseudo - random numbers based on a special property of prime numbers 超素数法长周期伪随机数发生器的应用算法 |
| 2. | Of course , we have to make sure that the address with this instruction does not contain a null byte itself 然后,将这个种子值馈送给出色的伪随机数发生器(我们将在下一部分中讨论) 。 |
| 3. | As a result , it is necessary to add a digital interface to trng which is realized by analog circuit 因此就需要为以模拟电路为核心的真随机数发生器添加数字接口,以符合规定的总线协议标准。 |
| 4. | Taking the design and realization of trng as reference , this thesis make detail introduce of the three kinds of design flow 本文结合数模混合的真随机数发生器ip的设计和实现,对这三套流程进行了比较详尽的介绍。 |
| 5. | The rsa key generator is made up of two parts : random number generator ( rng ) and the implementation of rsa key generation algorithm Rsa密钥生成器由两大部分构成:硬件随机数发生器和rsa密钥生成算法的软件实现。 |
| 6. | Where gary and john introduce their philosophy of security , and explain why they re focusing on software security issues facing developers ,这是gary和john所撰写的文章,讨论有关如何通过软件实现可靠的随机数发生器。 |
| 7. | It is widely accepted that the core of any truly random number generator ( trng ) must be an intrinsically random physical process 传统的真随机数发生器,其核心是一个真正随机的物理过程;如利用噪声产生真随机数等。 |
| 8. | Crafting an exploit for a stack overflow is fairly difficult , even if you have mastered the underlying concepts covered in our series of articles 一个极端是传统的伪随机数发生器,它很容易被攻破,因此不适合注重安全性的应用程序。 |
| 9. | On unix machines , the goal of the attacker is to get an interactive shell . this means typical attack code usually attempts to fire up 直到世界上每台计算机都在硬件中安装了随机数发生器为止,总是需要一种尽可能接近真正随机性的软件。 |
| 10. | With the development of the theory of nonlinear systems , the behavior of chaos has provided new theory foundation and realization for trng 随着非线性系统理论的发展,非线性系统的混沌行为设计真随机数发生器提供了新的理论基础和实现方法。 |