隨機數發生 的英文怎麼說
中文拼音 [suíjīshǔfāshēng]
隨機數發生
英文
random number generation-
To simulate the preparation of the secret - key, a gaussian random number generator in fpga is designed, which based on the analysis of ziggurat algorithm
為了模擬密鑰的制備,在分析ziggurat演算法的基礎上完成了高斯隨機數發生器的fpga實現。The rsa key generator is made up of two parts : random number generator ( rng ) and the implementation of rsa key generation algorithm
Rsa密鑰生成器由兩大部分構成:硬體隨機數發生器和rsa密鑰生成演算法的軟體實現。Random number generators are used in many areas including computer simulation, monte - carlo techniques on numerical analysis, test problem generation for the performance evaluation of computer algorithms, statistical sampling, and so on
隨機數發生器在很多領域有廣泛的應用,包括計算機模擬、數值分析上的蒙特卡羅方法、評估演算法的測試問題、統計抽樣等等。Because the random numbers generators are the key of monte carlo methods and quasi - monte carlo methods. chapter 2 describes the pseudo - random number generators and quasi - random number generators
因為隨機數發生器是蒙特卡羅和擬蒙特卡羅方法的核心之一,所以第2章介紹了偽隨機數和擬隨機數發生器。A pile of practical issues get in the way of directly applying the theory. remember, stealing someone else s work whenever possible makes buffer overflow exploits much easier
另一個極端是基於硬體的隨機數發生器,它可以執行非常好的性能,但通常由於其昂貴的價格或缺少普遍可用性而不實用。The security of the algorithm is analyzed from the randomness, linear complexity of the chaotic sequence and the intensity of initial key. the results show the randomness of the key sequence pass the frequency test, sequential test, poker test, autocorrelation test, runs test, etc. and the total level is better than the binary sequence generated by the prng of delphi 7. 0, logistic chaotic system and rc4, the linear complexity comes up to the expectation, the initial key has very strong intensity
本文最後從混沌序列的隨機性、線性復雜度和初始密鑰的強度三個方面對演算法進行了安全性分析,結果表明演算法產生的密鑰序列的隨機性完全通過了頻數檢驗、序列檢驗、撲克檢驗、自相關檢驗和遊程檢驗等5種統計檢驗方法的檢驗,而且整體水平要好於delphi7 . 0中的偽隨機數發生器、 logistic混沌系統和rc4三種方法產生的二進制序列,線性復雜度達到了數學期望值。When the data of logistics in current process are used for input of simulating logistics in future 100 % continuous casting process, supply of hot metal from iron - making process may not satisfy the needs of 100 % continuous casting on raw materials. because planning scheme in continuous casting process depends greatly on smelting scheme in convertor vessel, it is important for operator to balance raw materials supply, smelting and casting in order to realize the scheme of 100 % continuous casting. when some equipment are work abnormally, mixer of hot metal and lf furnace can be used for logistics buffer
用攀鋼煉鋼生產數據對模擬軟體系統進行的測試和模擬研究結果表明:模擬系統的隨機數發生演算法可以實現對作業時間的依分佈隨機抽取;在相似的輸入條件下,模擬結果與實際生產物流的時間分佈規律基本吻合,達到了模擬軟體設計的預期目標;若以攀鋼提釩煉鋼廠現工藝的鐵水輸入作為全連鑄后的輸入條件,則現工藝的物料供應能力可能難以滿足全連鑄生產的要求;連鑄機的連澆計劃對轉爐爐次計劃的編制有很高的要求,合理安排來料、煉鋼與澆鑄三者間的物流平衡關系將是保證全連鑄作業的重要條件;當出現設備異常情況時,可以利用混鐵爐與lf爐站前等待作為物流緩沖池,通過延長系統的平均物流時間來緩解因設備檢修和故障等擾動所造成的影響,確保生產的順利進行。Taking the design and realization of trng as reference, this thesis make detail introduce of the three kinds of design flow
本文結合數模混合的真隨機數發生器ip的設計和實現,對這三套流程進行了比較詳盡的介紹。In this dissertation we study the important characteristic of monte carlo method - - - generation and testing of pseudo - random number 。 we programmed a program of uniform random - number generator and uniform random - vector generator, and simply test the performance of random - number generator
研究了蒙特卡羅方法的重要特徵隨機數的產生和檢驗,編寫了一個均勻隨機數和隨機向量發生器程序,並對隨機數發生器進行了簡單檢驗。Talking about the random number generators, we discussed the details of the generating algorithm of the middle - square method, the linear congruential method, the chaos - mapping method, ansi x9. 17, dsa, and the intel generator
在隨機數的生成方面,本文討論了常用的隨機數發生器,包括平方取中法,線性同余法,混沌映射法,以及ansix9 . 17 , dsa ,和intel的隨機序列發生器。Pseudo - random number generator, a mechanism used in a computer system to create, in as non - deterministic a manner as possible, a seed value from which a pseudo - random number will be derived
偽隨機數發生器( pseudo - random number generator ) ,它是在計算機系統中使用的以盡可能不確定的方式創建種子值的一種機制,然後從該種子值派生出偽隨機數。On unix machines, the goal of the attacker is to get an interactive shell. this means typical attack code usually attempts to fire up
直到世界上每臺計算機都在硬體中安裝了隨機數發生器為止,總是需要一種盡可能接近真正隨機性的軟體。Method of generating long period pseudo - random numbers based on a special property of prime numbers
超素數法長周期偽隨機數發生器的應用演算法Of course, we have to make sure that the address with this instruction does not contain a null byte itself
然後,將這個種子值饋送給出色的偽隨機數發生器(我們將在下一部分中討論) 。As a result, it is necessary to add a digital interface to trng which is realized by analog circuit
因此就需要為以模擬電路為核心的真隨機數發生器添加數字介面,以符合規定的總線協議標準。Where gary and john introduce their philosophy of security, and explain why they re focusing on software security issues facing developers
,這是gary和john所撰寫的文章,討論有關如何通過軟體實現可靠的隨機數發生器。It is widely accepted that the core of any truly random number generator ( trng ) must be an intrinsically random physical process
傳統的真隨機數發生器,其核心是一個真正隨機的物理過程;如利用噪聲產生真隨機數等。Crafting an exploit for a stack overflow is fairly difficult, even if you have mastered the underlying concepts covered in our series of articles
一個極端是傳統的偽隨機數發生器,它很容易被攻破,因此不適合注重安全性的應用程序。With the development of the theory of nonlinear systems, the behavior of chaos has provided new theory foundation and realization for trng
隨著非線性系統理論的發展,非線性系統的混沌行為設計真隨機數發生器提供了新的理論基礎和實現方法。Unfortunately, we have to get the address exactly right, down to the byte, or the program will crash. coming up with the right address using the trial and error approach may take a while. to make things easier, we can insert lots of null operations in front of the shell code
但是,問題的大部分是因為數據很可能有統計偏差,因此大量精力花在了使用七個密碼散列和一個相當慢(但非常好)的偽隨機數發生器來消除此類問題上。分享友人