Random Number Generators for Computer Simulation and Cyber Security - Info and Reading Options
Design, Search, Theory, and Application
By Lih-Yuan Deng, Nirman Kumar, Henry Horng-Shing Lu and Ching-Chi Yang
"Random Number Generators for Computer Simulation and Cyber Security" was published by Springer in 2025 - Cham, it has 260 pages and the language of the book is English.
“Random Number Generators for Computer Simulation and Cyber Security” Metadata:
- Title: ➤ Random Number Generators for Computer Simulation and Cyber Security
- Authors: Lih-Yuan DengNirman KumarHenry Horng-Shing LuChing-Chi Yang
- Language: English
- Number of Pages: 260
- Publisher: Springer
- Publish Date: 2025
- Publish Location: Cham
Edition Specifications:
- Pagination: xii, 254
Edition Identifiers:
- The Open Library ID: OL57749601M - OL42545141W
- ISBN-13: 9783031767210 - 9783031767241
- All ISBNs: 9783031767210 - 9783031767241
AI-generated Review of “Random Number Generators for Computer Simulation and Cyber Security”:
"Random Number Generators for Computer Simulation and Cyber Security" Description:
Open Data:
This book discusses the theory and practice of random number generators that are useful for computer simulation and computer security applications. Random numbers are ubiquitous in computation. They are used in randomized algorithms to perform sampling or choose randomly initialized parameters or perform Markov Chain Monte Carlo (MCMC). They are also used in computer security applications for various purposes such as cryptographic nuances or in authenticators. In practice, the random numbers used by any of these applications are from a pseudo-random sequence. These pseudo-random sequences are generated by RNGs (random number generators). This book discusses the theory underlying such RNGs, which are used by all programmers. However, few try to understand the theory behind them. This topic is an active area of research, particularly when the generators are used for cryptographic applications. The authors introduce readers to RNGs, how they are judged for quality, the mathematical and statistical theory behind them, as well as provide details on how these can be implemented in any programming language. The book discusses non-linear transformations that use classical linear generators for cryptographic applications and how to optimize to make such generators more efficient. In addition, the book provides up-to-date research on RNGs including a modern class of efficient RNGs and shows how to search for new RNGs with good quality and how to parallelize these RNGs. In summary, this book: Discusses the theoretical basis and intuition of various random number generators without overly detailed proofs Enables readers to design, develop, modify, or experiment with new random number generators Provides comprehensive coverage of random number generation for both simulation and cryptographic applications
Read “Random Number Generators for Computer Simulation and Cyber Security”:
Read “Random Number Generators for Computer Simulation and Cyber Security” by choosing from the options below.
Search for “Random Number Generators for Computer Simulation and Cyber Security” downloads:
Visit our Downloads Search page to see if downloads are available.
Find “Random Number Generators for Computer Simulation and Cyber Security” in Libraries Near You:
Read or borrow “Random Number Generators for Computer Simulation and Cyber Security” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Random Number Generators for Computer Simulation and Cyber Security” at a library near you.
Buy “Random Number Generators for Computer Simulation and Cyber Security” online:
Shop for “Random Number Generators for Computer Simulation and Cyber Security” on popular online marketplaces.
- Ebay: New and used books.