Random Sources for Cryptographic Systems

  • G. B. Agnew
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 304)


Random and pseudorandom sources have long been of interest in the study of statistical processes. Applications include the simulation of computer networks and communication channels. In these systems, pseudorandom sources (PRS) are preferred over true random sources (TRS) as repeatability (recreatability) of observations is important.


Integration Period Metal Insulator Semiconductor Random Source Dark Current Density Cryptographic System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    R. Rivest, A. Shamir, L. Adleman, ‘On digital signatures and public key cryptosystems’, Comm. of ACM, Vol. 21, Feb. 1978, pp.120–126zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    W. Diffie, M. Hellman, ‘Privacy and authentication: An introduction to cryptography’, Proc. of the IEEE, Vol. 67, March 1979, pp. 397–427.CrossRefGoogle Scholar
  3. 3.
    D. Kahn, ‘Cryptography and the origin of spread spectrum’, IEEE Spectrum, Vol. 21, no. 9, Sept. 1984, pp. 70–80.Google Scholar
  4. 4.
    IEEE Standard Dictonary on Electrical and Electronic Terms, IEEE Inc., New York, 1984.Google Scholar
  5. 5.
    G. Hobson, ‘Charge Transfer Devices’, Edward Arnold, London, 1978.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1988

Authors and Affiliations

  • G. B. Agnew
    • 1
  1. 1.Dept. of Electrical EngineeringUniversity of WaterlooWaterlooCanada

Personalised recommendations