CA1146281A - Data hashing method and apparatus - Google Patents

Data hashing method and apparatus

Info

Publication number
CA1146281A
CA1146281A CA000366189A CA366189A CA1146281A CA 1146281 A CA1146281 A CA 1146281A CA 000366189 A CA000366189 A CA 000366189A CA 366189 A CA366189 A CA 366189A CA 1146281 A CA1146281 A CA 1146281A
Authority
CA
Canada
Prior art keywords
signal
pseudo
output
random
key data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000366189A
Other languages
French (fr)
Inventor
Duwayne D. Oosterbaan
Gerard J. Williams
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NCR Voyix Corp
Original Assignee
NCR Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NCR Corp filed Critical NCR Corp
Application granted granted Critical
Publication of CA1146281A publication Critical patent/CA1146281A/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables

Abstract

DATA HASHING METHOD AND APPARATUS

Abstract of the Disclosure Hashing of a key data signal is accomplished by utilizing a pseudo-random number signal generator for generating a randomized signal in response to the key data signals and an output register for serially receiving the generated pseudo-random signal and for providing segments of the serially-received signal at its output.
A counting circuit responsive to a preselected number of shift signals provides an output valid signal when the preselected number of shift signals has occurred and further shifts the pseudo-random number signal generator an amount corresponding to the preselected number of shift signals. The method of the present invention utilizes the steps of presetting the pseudo-random num-ber generator and the counting circuit to an initialized state. The counting circuit is then loaded with a pre-determined count whereupon key data is entered into the pseudo-random number generator so as to randomize the key data. A valid signal is provided when a block of key data has been hashed and the steps of entering the key data and providing a valid signal upon the occurrence of each block of key data is repeated until all key data blocks have been hashed.

Description

2~
_:L

DATi\ ~ASI~It`lG MÆTHOD AND APP~RAT[lS

Back~round of the Inver_tion In computerized processin~ of data, it is common practice to store lilce data items as multiple entries within a narned data file. A portion of each record, referred to as the key, is used to reference a specific record. The keys are assumed to be unique throughout the file. Fundamental to the processin(3 o the data file is the search for a data record associated with a specific key. A number of techniques have been developed which perform this particular function. A
class of these techniques is referred to as hashiny access methods.
A hashing access method is commonly used ~hen the number of actual keys is a small percentage of the total number of possible keys. This generally occurs when 'the key data is represented as ASCII character codes. An example is a 6-digit part number ranging from 000000 to 999999, which requires a 6-byte field ~48 bits) with only tell valid values for each byte out of a possible 256 unique values. Another example is the use of a person's name as the key. In this case a fixed length field (say 20 bytes) is allocated for key data.
Since all names do not contain 20 characters and certain combinations of letters do not realistically represent a name, a high percenta(3e oE possible bit configuration~
will never be used as vali-l keys.
A distinguishin~ property of hashing methods is that they do not uniquely map keys to record storage locations. Instead, they provide Eor more than one key to map to a specific table entry which contains the location of one or more records. ~['he object of effective hashing methods is to arrive at a uniform distribution of the number of keys which map to a specific starting pointer thus millimizing the search time for any randomly selected key.

~ 2-Research done on hashing algorithms has pro-duced a variety of methods, each one tailored to a specific set of properties possessed by the keys, that is, alpha keys, alpha-numeric keys, numeric keys, close-ness of adjacent keys, number of repeated characters inthe keys, etc. For software implemented hashing tech-niques, it may be acceptable to support several methods and allow the user to choose the most efficient based on his analysis of the key set to be used. The present invention has as an object the elimination of the need to support a variety of hashing methods by randomizing the data within the key such that all original properties of closeness, adjacency, and orderliness are removed.
The following patents are representative of the state of the art as known by applicants: 3,651,483,
3,742,460, 4,042,913, 4,064,489, 4,068,300/ 4,086,628,
4,099,242.
The following three publications represent some teachings related to hashing techniques. The Art of Computer Programming, Vol. 3, published by Addison-Wesley Publishing Company, pages 506,549 offered by D. E~ Knuth. Assembler Language for FORTRAN, COBOL, and P.L./I Programmers, IBM 370/360, pages 69-70 by S. S.
Kuo published by Addison-Wesley Publishing Company.
Hash table methods by W. D. Maurer and T. G. Lewis, published by the Association for Computing Machinery.

Summary of the Invention The present invention is directed to a random-izing apparatus characterized by first and second pseudo-random generators (26 and 28) each having an input and an output operatively connected in a cross-coupled con-figuration (22 and 24) for generating a pseudo-random signal in response to data signals and logic means (20) for coupling the data signals to the input of the first and the second pseudo-random generators (26 and 28).
An output register means (32) is adapted to serially receive the generated pseudo-random signal for providiny a segment of the serially received signal in parallel at its output and a programmable counting means (36-56) for counting count pulses, having an input terminal adapted to receive a predetermined number, the predetermined number having a value equal to the number of bits that are to be used to form the segment in the output register means, and further for providing an output valid signal when the counter count pulses corresponds to the predetermined number , thereby indicating the availability of the segment of the generated pseudo-random signal at the output of the output register means.
From the foregoing it can be seen that it is a primary object of the present invention to provide an improved apparatus for hashing digital data.
It is another object of the present invention to eliminate the need to support a variety of hashing methods by randomizing the data within the key blocks such that all original properties of closeness, adja-cency, and orderliness are removed.
It is an object of the present invention to provide apparatus which is independent of key length in its hashing properties.
It is another object of the present invention to provide a hardware implemented apparatus for perform-ing the hashing function. These and other objects of the present invention will become more apparent when taken in conjunction with the following description and drawings wherein like characters indicate like parts and which drawings form a part of the present invention.

Brief Description of the Drawings Figs. lA and lB are a block schematic of the pre-ferred apparatus of the present invention.
Figs. 2A and 2B are a logic schematic of a firstgenerator which may be used in the preferred apparatus of Figs. lA and lB.
Figs. 3~ and 3B are a logic schematic of a second generator which may be used in conjunction with the first generator of Figs. 2A and 2B.
Fig. 4 is a logic schematic of a register which may be used in the preferred apparatus of Figs. lA and lB.
Fig. 5 is a timing diagram useful in under-standing the operation of the preferred apparatus em-bodiment of the present invention.

Description of the Preferred Embodiment -Referring to Figs. lA and lB, the AND gate 20 received two inputs; a LOAD DATA input and a DATA IN
input. The output of AND gate 20 is directed to inputs of Exclusive OR gates 22 and 24. The outputs of Exclu-sive OR gates 22 and 24 are directed to the inputs of pseudo-random number generators 26 and 28, respectively.
These gates logically operated to combine DATA IN with bits from the pseudo-random number generators 26 and 28. The generator inputs are labeled D. Each generator has a clocking input, labeled C for receiving a SHIFT
CLOCK signal, and a preset input, labeled R, for receiv-ing a PRESET signal. A clocking signal applied to in-put C causes the generators, which are in the preferredembodiment shift registers, to shift the contents through the register. The PRESET signal initializes the gen-erators to a starting condition. The output of generator 26 is directed to an input of an Exclusive OR gate 30 and to the input of Exclusive OR gate 24. The output from generator 28 is directed to the other input of Exclusive OR gate 30 and to an input of Exclusive OR
gate 22. The output of Exclusive OR gate 30 is direct-ed to the D input of an output register 32. The clock-ing input C of output register 32 is adapted to receivethe SHIFT CLOCK signal. The output register 32 in the preferred embodiment of the invention is a serial-in, .~

~6~

parallel-out shift register of sixteen stages with each of the output stages labeled from 1-16. A more detail-ed description of cross-coupled pseudo-random number generators is contained in U.S. Patent No. 4,264,781, issued April 28, 1981, entitled "Apparatus for Encoding and Decoding Data Signals", by D. D. Oosterbaan and G. J. Williams, the inventors of the present invention.
The present patent application and the aforereferenced patent are both assigned to NCR Corporation.
A serial-in, parallel-out count register 36 is adapted to receive the DATA IN signal on its D input.
A LOAD COUNT signal is addressed to an input of an AND
gate 34 and gated by a CLOCK signal applied to the other input of AND gate 34, and the output of AND gate 34 coupled to the clock input, labeled C of count register 36. A down counter 38 receives the PRESET signal on its PE labeled input and a COUNT signal on its C labeled input. The PRESET signal is inverted by an inverter 40 to provide a PRESET signal and the CLOCK signal is in-verted by an inverter 42 to provide a CLOCK signal~
The output of the down counter 38 which output is the terminal count TC is directed to an inverter 44. The output of inverter 44 is connected to an input of AND
gate 46. The output of AND gate 46 is connected to the J and K inputs of a JK flip-flop 40. The LOAD DATA
signal is directed to an inverting amplifier 48, the output of which is connected to the set input, labeled S, of flip-flop 40, and to an input of an AND gate 54.
The Q output of flip-flop 40 is connected as an input to AND gate 52 and to AND gate 46. The PRESET signal is applied to the R labeled input of flip-flop 40, and the CLOCK signal is applied to the C labeled input.
The CLOCK signal is applied to the other input of AND
gate 52. The output of AND gate 52 is the SHIFT CLOCK
signal which also is applied to the other input of AND
gate 54 and to the C labeled inputs of generators 26 and 28. The output of AND gate 54 is the COUNT signal.
The Q output of flip-flop 40 is directed to the C labeled input of a J-K flip-flop 56. A voltage Vcc is applied to the J and the K labeled inputs to flip-flop 56. The PRESET signal is applied to the R labeled input of flip-flop 56. The output of flip-flop 56 is taken from the Q
labeled output. The output signal is designated OUTPUT
VALID.
A pseudo-random number generator suitable for use as generator 26 is disclosed in Figs. 2A and 2s. A
string of sixteen D-type flip-flops are connected in serial fashion with the Q output of each flip-flop being connected to the D input of the following flip-flop.
Each of the D-type flip-flops labeled 1-16 is clocked by the CLOCK signal applied to the C labeled inputs. The PRESET signal is applied to each of the R
labeled inputs of the sixteen flip-flops to reset the register to an initial condition.
In the preferred embodiment of this invention 0 generator 26 was designed to generate a random number i 1 X16 + X12 + Xll + X9 + x8 + x + x + X +1-This was accomplished by Exclusive ORing each of thefirst shift register outputs which correspond in number to the exponent of the to be simulated polynomial, for which, xl6 is simulated by taking the Q output from the D flip-flop numbered 16 and by providing it as an input to an Exclusive OR gate 74. In a like manner1 the output of flip-flop 12 is directed to the other input of Exclusive OR gate 74 to simulate the terms x + x C3rrespondingly, the output from flip-flop 11 is com-bined in Exclusive OR gate 72 with the output from Exclusive OR gate 74 and the output of flip-flop 9 is combined in Exclusive OR gate 70 with the output from Exclusive OR gate 72. Exclusive OR gates 68, 66, 64 and 62, in a like manner, simulate the x8 -~ x4 + x3 -~ x2 elements of the polynomial. The output of the Exclusive OR gate 62 is then directed back to the input of an 6~

Exclusive OR gate 60 to provide a closed loop path. The last remaining term is derived from the Q output of flip-flop 1, which output is labeled Gl and is the output of the pseudo generator 26. The Exclusive OR
gate 60 receives as its other input the D signal which data signal is combined on a bit by bit basis with the bits received from the output of Exclusive OR gate 62.
Referring now to Figs 3A and 3B, the pseudo-random number generator 28 is shown comprised of sixteen serially connected D-type flip-flops labeled 1 through 16. The Q output of each flip-flop is connected to the D
input of the succeeding flip-flop. In the preferred embodiment of the invention, pseudo-random number gener-ator 28 was designed to implement the polynomial xl6 +
xl2 + x3 + x + 1. The reset input to each flip-flop is labeled R. The D signal which is received from the Exclusive OR gate 24 is directed to one input of Exclu-sive OR gate 60. The output of each flip-flop is labeled according to the flip-flop's position in the serial string and corresponds to a bit position in a sixteen bit signal.
Referring to Fig. 4, the output register 32 is illustrated comprised of 16 D-type flip-flops serially connected with the Q output of each flip-flop connected to the D input of the succeeding flip-flop. The CLOCK
and PRESET signals are applied to the C and D labeled inputs on each of the 16 flip-flops. The output from output register 32 is taken from the Q output oE each of the flip-flops and corresponds to 16 bits of a block of hashed key data.
The hardware implementation of the preferred embodiment of the invention has been set forth above.
In operation, the purpose of the apparatus is to random-ize (hash) blocks of key data consisting of N bits to a table address space consisting of 2K entries where K is much less than N. This process is accomplished by utilizing the presettable pseudo-random number generator and the counting circuit in the following steps:
1. Presetting the pseudo-random number generator and the counting circuit to an initialized state.
2. Loading a predetermined count in-to the counting circuit.
3. Entering key data into the pseudo-random number generator to randomize the key data.
4. Complete the key data randomizing and provide an output valid signa' in accordance with the count in the counting circuit.
5. Repeating steps 2, 3 and 4 until all desired key data has been hashed.
Referring to Figs. lA and lB in conjunction with Figs. 5A-5I, the apparatus is initialized by the PRESET
signal (Fig. 5C) being applied to the various preset terminals to set the OUTPUT VALID signal low and to in-hibit internal clocks. The constant value K is loaded into the count register 36 by raising the LOAD COUNT
signal (Fig. 5D) to a high level and presenting the DATA IN signal (Fig. 5B) representing the constant value K, bit by bit, on the DATA IN input terminal. This data is then clocked (Fig. 5A) serially into the count register 36 during the LOAD COUNT CYCLE. The value of the constant should be equal to the number of bits in the output register 32 that are used for the hash address. In the preferred embodiment of the invention, K was limited to Hex FF and the number of outputs of the output register 32 were therefore limited to sixteen. After the count register 36 is loaded, activating the PRESET signal (Fig. 5C) again will transfer this value into the down counter 38 and will initialize the pseudo-random number generators 26 and 28. A block of key data may then be loaded bit by bit onto the DATA INPUT line to AND gate 20 and count register 36. Activating the LOAD DATA
signal (Fig. 5E) enables the key data to be directed to the cross-coupled pseudo-random number generators 26 and 28. The LOAD DATA signal going true enables the SHIFT CLOCK signal (Fig. 5F) for the generators 26 and 28 and the serial-to-parallel output register 32. The LOAD DATA going false enables the COUNT signal (Fig.
5G) to the down counter 38. The shift clock signal and the COUNT signal will continue until the terminal count TC (Fig. 5H) is reached in the down counter 38.
The terminal count signal will disable the SHIFT CLOCK
and the COUNT signal and set the output of flip-flop 5~ to indicate an OUTPUT VALID signal. On receipt of the OUTPUT VALID signal, the outputs present on the terminals 1-16 of the output register 32 will be valid hashed data.
In the preferred embodiment of the invention, the outputs from each of the pseudo-random number gener-ators is cross-coupled to the input of the other pseudo-random generator so as to further scramble (or encode) a DATA IN signal. Exclusive ORing of the output from each of the pseudo-random number generators insures a high degree of randomness to the DATA IN signal. The random-ized signal is then applied to the output register which register accumulates a selected number of data transi-tions or data bits, in this case, sixteen bits of data and outputs the data in blocks of sixteen.
From the aforementioned description of the preferred embodiment of the invention, it can be seen that there is an advantage in that a uniform distribution of key mappings into the table address space as the number of keys becomes large relative to the size of the table address space is provided and that the apparatus removes any properties which the original keys may have, such as determinate relationship to each other. In addition, the apparatus is independent of -the key length.
While there has been shown what is considered to be the preferred embodiment of the invention, it will be manifest that many modifications may be made therein without departing from the essential spirit of the invention. It is intended, therefore, in the annexed claims to cover all such changes and modifications as may fall within the true scope of the invention.

B

.

.

Claims (2)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A randomizing apparatus characterized by first and second pseudo-random generators (26 and 28) each having an input and an output operatively connected in a cross-coupled configuration (22 and 24) for gen-erating a pseudo-random signal in response to data signals; logic means (20) for coupling the data signals to the input of said first and said second pseudo-random generators (26 and 28); output register means (32) adapted to serially receive said generated pseudo-random signal for providing a segment of said serially received signal in parallel at its output; and programmable counting means (36-56) for counting count pulses, having an in-put terminal adapted to receive a predetermined number, said predetermined number having a value equal to the number of bits that are to be used to form the segment in said output register means, and further for providing an output valid signal when said counter count pulses corresponds to said predetermined number thereby indicat-ing the availability of the segment of said generated pseudo-random signal at the output of said output register means.
2. The randomizing apparatus according to claim 1 wherein said first and second pseudo-random generators (26 and 28) are shift registers which shift in response to a clock signal and further comprising a source of clock signals (42); means (44, 46, 40, and 52) for applying said clock signals to said first and second pseudo-random generators when data signals are to be randomized; and counter means (36 and 38) settable to a load count for counting said clock signals, said counter means providing a terminal signal for disabling the 2 (concluded) clocking signals to said pseudo-random generators and for providing an output valid signal when said output register means contains a segment of said generated pseudo-random signal.
CA000366189A 1979-12-07 1980-12-05 Data hashing method and apparatus Expired CA1146281A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US06/101,319 US4418275A (en) 1979-12-07 1979-12-07 Data hashing method and apparatus
US101,319 1979-12-07

Publications (1)

Publication Number Publication Date
CA1146281A true CA1146281A (en) 1983-05-10

Family

ID=22284028

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000366189A Expired CA1146281A (en) 1979-12-07 1980-12-05 Data hashing method and apparatus

Country Status (6)

Country Link
US (1) US4418275A (en)
EP (1) EP0041549B1 (en)
JP (1) JPS6360415B2 (en)
CA (1) CA1146281A (en)
DE (1) DE3072073D1 (en)
WO (1) WO1981001758A1 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578531A (en) * 1982-06-09 1986-03-25 At&T Bell Laboratories Encryption system key distribution method and apparatus
US4780816A (en) * 1986-05-16 1988-10-25 The United States Of America As Represented By The Secretary Of The Army Key-to-address transformations
US4922417A (en) * 1986-10-24 1990-05-01 American Telephone And Telegraph Company Method and apparatus for data hashing using selection from a table of random numbers in combination with folding and bit manipulation of the selected random numbers
DE3636426A1 (en) * 1986-10-25 1988-05-05 Standard Elektrik Lorenz Ag METHOD FOR ENTERING OPERATING COMMANDS IN A COMPUTER-CONTROLLED ACTUATOR
US4771463A (en) * 1986-12-05 1988-09-13 Siemens Transmission Systems, Inc. Digital scrambling without error multiplication
US4823345A (en) * 1987-06-15 1989-04-18 International Business Machines Corp. Method and apparatus for communication network alert record identification
US5113444A (en) * 1990-09-05 1992-05-12 Arnold Vobach Random choice cipher system and method
EP0483424A1 (en) * 1990-10-30 1992-05-06 International Business Machines Corporation Key hashing in data processors
US5307412A (en) * 1992-09-30 1994-04-26 Vobach Arnold R Random coding cipher system and method
US5335280A (en) * 1993-01-28 1994-08-02 Vobach Arnold R Random sum cipher system and method
US5412721A (en) * 1993-03-26 1995-05-02 Motorola, Inc. Method for loading and utilizing a key in a secure transmission device
US5363448A (en) * 1993-06-30 1994-11-08 United Technologies Automotive, Inc. Pseudorandom number generation and cryptographic authentication
US5377270A (en) * 1993-06-30 1994-12-27 United Technologies Automotive, Inc. Cryptographic authentication of transmitted messages using pseudorandom numbers
US5680131A (en) * 1993-10-29 1997-10-21 National Semiconductor Corporation Security system having randomized synchronization code after power up
GB9909539D0 (en) * 1999-04-27 1999-06-23 Ncipher Corp Limited Data storage and retrieval
JP2001016196A (en) * 1999-04-28 2001-01-19 Fuji Soft Abc Inc Enciphering/deciphering method using multiple affine key, authenticating method and each device using the same
US20050289520A1 (en) * 2004-06-29 2005-12-29 Redvers Consulting, Ltd. Unidirectional cloaking device for source code
US8595273B2 (en) * 2007-01-24 2013-11-26 International Business Machines Corporation Hash algorithm using randomization function

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1190809A (en) * 1967-06-26 1970-05-06 Ericsson Telefon Ab L M Improvements in and relating to the Generation of a Pulse Code
US3651483A (en) * 1969-01-03 1972-03-21 Ibm Method and means for searching a compressed index
GB1382048A (en) * 1971-09-15 1975-01-29 Int Computers Ltd Randomnumber generators
US4086628A (en) * 1971-11-10 1978-04-25 International Business Machines Corporation Directory generation system having efficiency increase with sorted input
US3742460A (en) * 1971-12-20 1973-06-26 Sperry Rand Corp Search memory
US3784743A (en) * 1972-08-23 1974-01-08 Bell Telephone Labor Inc Parallel data scrambler
FR111574A (en) * 1973-12-13 1900-01-01
GB1492260A (en) * 1974-10-29 1977-11-16 Int Computers Ltd Data processing systems
DE2451794C3 (en) * 1974-10-31 1980-07-17 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt Method for testing digital communication links with random binary character strings
GB1513586A (en) * 1975-11-21 1978-06-07 Ferranti Ltd Data processing
US4042913A (en) * 1976-04-30 1977-08-16 International Business Machines Corporation Address key register load/store instruction system
US4099242A (en) * 1976-11-03 1978-07-04 Houston George B One-pass general associative search processor
US4115657A (en) * 1976-11-11 1978-09-19 Datotek, Inc. Random digital code generator
DE2658065A1 (en) * 1976-12-22 1978-07-06 Ibm Deutschland MACHINE ENCRYPTION AND DECHIFREEZE
GB1564563A (en) * 1977-05-25 1980-04-10 Int Computers Ltd Data sotrage apparatus
US4309750A (en) * 1978-01-23 1982-01-05 Mitsubishi Denki Kabushiki Kaisha Inverter device
US4290105A (en) * 1979-04-02 1981-09-15 American Newspaper Publishers Association Method and apparatus for testing membership in a set through hash coding with allowable errors
US4264781A (en) * 1979-04-16 1981-04-28 Ncr Corporation Apparatus for encoding and decoding data signals

Also Published As

Publication number Publication date
WO1981001758A1 (en) 1981-06-25
JPS6360415B2 (en) 1988-11-24
EP0041549B1 (en) 1988-02-03
DE3072073D1 (en) 1988-03-10
JPS56501695A (en) 1981-11-19
US4418275A (en) 1983-11-29
EP0041549A1 (en) 1981-12-16
EP0041549A4 (en) 1985-04-25

Similar Documents

Publication Publication Date Title
CA1146281A (en) Data hashing method and apparatus
Wheeler et al. Supercomputer investigations of a chaotic encryption algorithm
Pearson Fast hashing of variable-length text strings
Maurer et al. Hash table methods
James Monte Carlo theory and practice
EP0443752B1 (en) Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator
US6631390B1 (en) Method and apparatus for generating random numbers using flip-flop meta-stability
US5199073A (en) Key hashing in data processors
EP0240546B1 (en) Random sequence generators
US3811038A (en) Pseudo-random number generators
JPS6464087A (en) Portable electronic product
JP2000505214A (en) How to generate a confidential number
Bright et al. Quasi-random number sequences from a long-period TLP generator with remarks on application to cryptography
EP2002330B1 (en) Method and apparatus for generating random numbers
Chhabra et al. Engineering order‐preserving pattern matching with SIMD parallelism
EP0097997A2 (en) Method of generating a pseudo-random sequence of signs of a large sequence length
US4262358A (en) DES Parity check system
Yadav Design and analysis of digital true random number generator
JPS5663633A (en) Character input device
Lordahl Repairing the Microsoft BASIC RND function
Butcher A partition test for pseudo-random numbers
JPS55129855A (en) Mode designation unit in electronic register
SU976449A1 (en) Multi-dimensional static analyzer
JPS55105719A (en) Buffer device
Rubin Designing a high-security cipher

Legal Events

Date Code Title Description
MKEX Expiry