CHAPTER 8
Random Bit Generation and Stream Ciphers
8.1 Principles of Pseudorandom Number Generation
8.2 Pseudorandom Number Generators
Linear Congruential Generators
8.3 Pseudorandom Number Generation Using a Block Cipher
PRNG Using Block Cipher Modes of Operation
8.6 Stream Ciphers Using Feedback Shift Registers
Linear Feedback Shift Registers
Nonlinear Feedback Shift Registers
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.