The cryptographic security of truncated linearly related variables
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Unique extrapolation of polynomial recurrences
SIAM Journal on Computing - Special issue on cryptography
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Journal of the ACM (JACM)
On the Generation of Cryptographically Strong Pseudo-Random Sequences
Proceedings of the 8th Colloquium on Automata, Languages and Programming
How discreet is the discrete log?
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
Inferring sequences produced by pseudo-random number generators
Inferring sequences produced by pseudo-random number generators
Inferring sequences produced by pseudo-random number generators
Inferring sequences produced by pseudo-random number generators
Communications of the ACM - Special issue on simulation
Pseudorandom Bit Generators in Stream-Cipher Cryptography
Computer - Special issue on cryptography
How to predict congruential generators
CRYPTO '89 Proceedings on Advances in cryptology
Design of practical and provably good random number generators
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
On Sufficient Randomness for Secure Public-Key Cryptosystems
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
A generator of pseudo-random numbers sequences with maximum period
ICCMSE '03 Proceedings of the international conference on Computational methods in sciences and engineering
Security evaluation of email encryption using random noise generated by LCG
Journal of Computing Sciences in Colleges
Reconstructing noisy polynomial evaluation in residue rings
Journal of Algorithms
Quantum period reconstruction of approximate sequences
Information Processing Letters
Designs, Codes and Cryptography
A lightweight secure protocol for wireless sensor networks
Computer Communications
On stern's attack against secret truncated linear congruential generators
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A generator of pseudo-random numbers sequences with a very long period
Mathematical and Computer Modelling: An International Journal
Inferring sequences produced by nonlinear pseudorandom number generators using coppersmith's methods
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Predicting masked linear pseudorandom number generators over finite fields
Designs, Codes and Cryptography
GPU implementation of a scalable non-linear congruential generator for cryptography applications
Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI
Hi-index | 0.01 |
In this paper, efficient algorithms are given for inferring sequences produced by certain pseudo-random number generators. The generators considered are all of the form Xn = &Sgr;kj-l &agr;j&phgr;j(Xo, Xl, . . ., Xn-l) (mod m). In each case, we assume that the functions &phgr;j are known and polynomial time computable, but that the coefficients aj and the modulus m are unknown. Using this general method, specific examples of generators having this form, the linear congruential method, linear congruences with n terms in the recurrence, and quadratic congruences are shown to be cryptographically insecure.