Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems
2013 ◽
Vol 21
(4)
◽
pp. 761-770
◽
2003 ◽
Vol 32
(5)
◽
pp. 929-934
◽
Keyword(s):