Pseudorandom number generator (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Pseudorandom number generator" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
355th place
454th place
3,659th place
2,881st place
1,077th place
761st place
1,514th place
1,024th place
low place
7,566th place
8,793rd place
low place
low place
low place
9,889th place
low place
6,223rd place
6,135th place
8,888th place
6,276th place
9,571st place
low place
332nd place
246th place
low place
low place
2,092nd place
5,505th place
1st place
1st place

bund.de

bsi.bund.de

cornell.edu

cs.cornell.edu

cryptographyengineering.com

blog.cryptographyengineering.com

doi.org

  • Barker, Elaine; Barker, William; Burr, William; Polk, William; Smid, Miles (July 2012). "Recommendation for Key Management" (PDF). NIST Special Publication 800-57. NIST. doi:10.6028/NIST.SP.800-57p1r3. Retrieved 19 August 2013.
  • Matsumoto, Makoto; Nishimura, Takuji (1998). "Mersenne twister: a 623-dimensionally equi-distributed uniform pseudo-random number generator" (PDF). ACM Transactions on Modeling and Computer Simulation. 8 (1). ACM: 3–30. doi:10.1145/272991.272995. S2CID 3332028.
  • Marsaglia, George (July 2003). "Xorshift RNGs". Journal of Statistical Software. 8 (14). doi:10.18637/jss.v008.i14. S2CID 250501391.
  • Vigna S. (2016), "An experimental exploration of Marsaglia’s xorshift generators", ACM Transactions on Mathematical Software, 42; doi:10.1145/2845077.
  • Vigna S. (2017), "Further scramblings of Marsaglia’s xorshift generators", Journal of Computational and Applied Mathematics, 315; doi:10.1016/j.cam.2016.11.006.
  • Panneton, François; L'Ecuyer, Pierre; Matsumoto, Makoto (2006). "Improved long-period generators based on linear recurrences modulo 2" (PDF). ACM Transactions on Mathematical Software. 32 (1): 1–16. doi:10.1145/1132973.1132974. S2CID 7368302.

hiroshima-u.ac.jp

math.sci.hiroshima-u.ac.jp

java.net

hg.openjdk.java.net

jstatsoft.org

khanacademy.org

nist.gov

csrc.nist.gov

  • Barker, Elaine; Barker, William; Burr, William; Polk, William; Smid, Miles (July 2012). "Recommendation for Key Management" (PDF). NIST Special Publication 800-57. NIST. doi:10.6028/NIST.SP.800-57p1r3. Retrieved 19 August 2013.
  • "Security requirements for cryptographic modules". FIPS. NIST. 1994-01-11. p. 4.11.1 Power-Up Tests. Archived from the original on May 27, 2013. Retrieved 19 August 2013.

oracle.com

docs.oracle.com

schneier.com

semanticscholar.org

api.semanticscholar.org

umontreal.ca

iro.umontreal.ca

uni-mainz.de

staff.uni-mainz.de

unimi.it

prng.di.unimi.it

usc.edu

dornsifecms.usc.edu

web.archive.org