Academic literature on the topic 'Blum Blum Shub'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Blum Blum Shub.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Blum Blum Shub"

1

Ding, C. "Blum-Blum-Shub generator." Electronics Letters 33, no. 8 (1997): 677. http://dx.doi.org/10.1049/el:19970440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arroyo, Jan Carlo T. "An Improved Affine Cipher using Blum Blum Shub Algorithm." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 3295–98. http://dx.doi.org/10.30534/ijatcse/2020/126932020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harahap, Citono, Garuda Ginting, and Taronisokhi Zebua. "Perancangan Aplikasi Pengacakan Pemenang Undian Berhadiah Menggunakan Metode Blum-Blum Shub Berbasis Android." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 301. http://dx.doi.org/10.30865/jurikom.v7i2.2112.

Full text
Abstract:
Lottery or commonly known as a lottery is one way to raise funds used for humanitarian projects and social activities or a way to determine the winner randomly. So, the lottery does a random gift-giving process and the lottery is synonymous with the lottery. The design of a lottery winner randomization application is one of the more modern ways and can attract many lottery participants to enter the lottery by reducing the cost of printing and distributing lottery tickets. One of them is the blum blub shub method, which is a method that functions to generate random numbers mathematically with the resulting output is a series of binary numbers. the numbers that are made as winners. The designed application only simulates the process of inputting lottery numbers and the randomization process to get the winning numbers
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmed, Hanaa Mohusan, and Ahmed Oday Alazzawi. "User Authentication Secure by Randomly Cubic Spline Curve and Blum Blum Shub Algorithm." Al-Mustansiriyah Journal of Science 30, no. 1 (August 15, 2019): 99. http://dx.doi.org/10.23851/mjs.v30i1.421.

Full text
Abstract:
With the tremendous development witnessed by the world in recent times, computer security significance expanded as insurance procedure of registering systems and authentication the user with scientific and technological developments are increasing every day. This assurance procedure is connected for touchy information such of electronic business, electronic learning, and electronic saving money exchange, online networking and more administrations over the web by utilizing login application to distinguish the character for doing this authentication. The problem by using some application login how to detected the user authentic and experimental data collection and separated the duplicated name that may be Confusion the system with speed detected and difficult attack. This paper solve this problem by used Cubic spline to easy represented name and easy detected by distance Euclidean equation, authentication techniques utilized as insurance process by securing name mix with Blum Blum Shub (BBS) algorithm that have randomly number. In this work, the application is founded on type name that the combine with (BBS) and represented by cubic spline, to detected user. The result of proposed work require randomly number to drawing the curve to detect and how much the different shape in cubic spline curve that can be detected. Assurance gives affirmation distinguished suitable security and all the more effortlessly least complex that developing popular in the online application that shows in result some portion of the paper
APA, Harvard, Vancouver, ISO, and other styles
5

Sodhi, Gurpreet Kour, and Gurjot Singh Gaba. "DNA and Blum Blum Shub Random Number Generator Based Security Key Generation Algorithm." International Journal of Security and Its Applications 11, no. 4 (April 30, 2017): 1–10. http://dx.doi.org/10.14257/ijsia.2017.11.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Laia, O., E. M. Zamzami, and Sutarman. "Analysis of Combination Algorithm Data Encryption Standard (DES) and Blum-Blum-Shub (BBS)." Journal of Physics: Conference Series 1898, no. 1 (June 1, 2021): 012017. http://dx.doi.org/10.1088/1742-6596/1898/1/012017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kapovich, Michael. "Discreteness is undecidable." International Journal of Algebra and Computation 26, no. 03 (May 2016): 467–72. http://dx.doi.org/10.1142/s0218196716500193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vybornova, Y. D. "Password-based key derivation function as one of Blum-Blum-Shub pseudo-random generator applications." Procedia Engineering 201 (2017): 428–35. http://dx.doi.org/10.1016/j.proeng.2017.09.669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Calvert, Wesley, Ken Kramer, and Russell Miller. "The Cardinality of an Oracle in Blum-Shub-Smale Computation." Electronic Proceedings in Theoretical Computer Science 24 (June 3, 2010): 56–66. http://dx.doi.org/10.4204/eptcs.24.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Koepke, P., and A. S. Morozov. "The Computational Power of Infinite Time Blum–Shub–Smale Machines." Algebra and Logic 56, no. 1 (March 2017): 37–62. http://dx.doi.org/10.1007/s10469-017-9425-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Blum Blum Shub"

1

Olsson, Mikael, and Niklas Gullberg. "Blum Blum Shub on the GPU." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3759.

Full text
Abstract:
Context. The cryptographically secure pseudo-random number generator Blum Blum Shub (BBS) is a simple algorithm with a strong security proof, however it requires very large numbers to be secure, which makes it computationally heavy. The Graphics Processing Unit (GPU) is a common vector processor originally dedicated to computer-game graphics, but has since been adapted to perform general-purpose computing. The GPU has a large potential for fast general-purpose parallel computing but due to its architecture it is difficult to adapt certain algorithms to utilise the full computational power of the GPU. Objectives. The objective of this thesis was to investigate if an implementation of the BBS pseudo-random number generator algorithm on the GPU would be faster than a CPU implementation. Methods. In this thesis, we modelled the performance of a multi-precision number system with different data types; to decide which data type should be used for a multi-precision number system implementation on the GPU. The multi-precision number system design was based on a positional number system. Because multi-precision numbers were used, conventional methods for arithmetic were not efficient or practical. Therefore, addition was performed by using Lazy Addition that allows larger carry values in order to limit the amount of carry propagation required to perform addition. Carry propagation was done by using a technique derived from a Kogge-Stone carry look-ahead adder. Single-precision multiplication was done using Dekker splits and multi-precision modular multiplication used Montgomery multiplication. Results. Our results showed that using the floating-point data type would yield greater performance for a multi-precision number system on the GPU compared to using the integer data type. The performance results from our GPU bound BBS implementation was about 4 times slower than a CPU version implemented with the GNU Multiple Precision Arithmetic Library (GMP). Conclusions. The conclusion made from this thesis, is that our GPU bound BBS implementation, is not a suitable alternative or replacement for the CPU bound implementation.
APA, Harvard, Vancouver, ISO, and other styles
2

Tabares, Jimenez Ximena del Carmen [Verfasser], Ulrike [Akademischer Betreuer] Herzschuh, Florian [Akademischer Betreuer] Jeltsch, Niels [Gutachter] Blaum, and Hermann [Gutachter] Behling. "A palaeoecological approach to savanna dynamics and shrub encroachment in Namibia / Ximena del Carmen Tabares Jimenez ; Gutachter: Niels Blaum, Hermann Behling ; Ulrike Herzschuh, Florian Jeltsch." Potsdam : Universität Potsdam, 2021. http://d-nb.info/1227989784/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Ling-famg, and 張齡方. "A study of the Dan-shui Blue High Way and it''s sustainable development strategy." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/14204505059370781835.

Full text
Abstract:
碩士
國立中山大學
海洋環境及工程學系研究所
92
Since Taiwan joined the WTO (World Trade Organization), Taiwan’s agriculture confronted with great challenges. Taiwan government plans for the fishery into three expanded directions. Those are traditional fishery, breed fishery, and recreation fishery. Recreational fishery offers a wide range of recreations, including pond angling, touring of the sea bottom, and various types of sport fishing such as trolling and angling. The ‘Blue High Way’ is a kind of the recreation fisheries. The ‘Blue High Way’ in Dan-shui is the first line across Taipei country, Ji-long, Yi-lan, and Hua-lian. This dissertation will discuss the sustainable development strategies for the Dan-shui blue high way. This dissertation uses the dominant-less dominant design method. The qualitative data will be taken as the main result, and the quantitative data will be an auxiliary to the main result. The qualitative data were be collected by visiting government official, blue high way businessmen, residenters, and sightseers. The quantitative data derived from mail questionnaire that use the Delphi Method.
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Huei-Kuei, and 陳惠貴. "A Study of the Relationships among Meeting Environment , Customer Value, and Customer Satisfaction-Meetings on the “Blue Sky No.1” ship that runs on the Tam-Shui River for Example." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/4x7spb.

Full text
Abstract:
碩士
國立臺北科技大學
商業自動化與管理研究所
95
In today’s society. How to enable teams to operate at higher levels of efficiency? How to operate in complex organizations? How to understand the needs and objectives of organizations to solve problems and propose the most appropriate and unequivocal choice during an age of technical advancement and an increasing faster pace of life? How to promote the main theme of the organization to people outside of the organization? Meetings are among the most important activities in linking and facilitating communications among people, groups, and organizations. Many modern meetings have moved from inside meetings in the office to outside meetings in hotels, vacation resorts, or other meeting places that are outside of the office. Regardless, these meetings are still fixed and closed meetings. This research will describe mobile meetings on the “Blue Sky No.1” ship that is operated by Haloha Shipping and runs on the Tam-Shui River, part of the “Blue Highway”, to investigate the new type of meeting so research can be conducted on the value of experience and customer satisfaction. When a manager plans meeting environments, the main issue being considered is how to effectively communicate with customers so that their understanding of the environment will be affected, enabling customers to engage in high level interactions with the mobile meeting environment so their consumption behaviors and outcomes are affected. The “Customer Value” mentioned in this research refers to the subjective understanding and the evaluation after the meeting by the attendees of the mobile meetings that result from interactions with the environment. The main differentiating factor between this research and other research is the application of customer experience on meeting environments, and links to customer satisfaction concepts to discuss the cause and effect of the various different concepts. Subjects in this research consist mainly of customers and meeting groups on the “Blue Sky One”. By applying the survey method, it is expected 400 surveys will be distributed. The LISREL statistical tool is used to analyze the data gathered. The research hypothesis and cause and effect analysis will be conducted on the effective surveys that were returned. The cause and effect analysis to be investigated are as follows: 1.The meeting environment has positive effects on consumer value. 2.Consumer value has positive effects on consumer satisfaction. Keywords: Meeting Environment, Customer Value, Customer Satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
5

Hsu, Chiung-Wen, and 許瓊文. "A Case Study of the Partnership between Performing Art Group and Non-Profit Organization. - An Example of the Benefit Concert about Blue Sky Chorus and Shu kuang Association." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/634sdy.

Full text
Abstract:
碩士
國立臺北教育大學
音樂學系碩士班
104
The purpose of this study was to explore the sky Choir performing groups and non-profit organizations Shu -gun Association , between 2001 – 2015, the process development and practical experiences in partnership co- organized in Charity concert held 14 sessions. Research method is based on interviews manner, interviewees into two groups of leaders and decision-core cadres, a total of six persons. And ,the collection and analysis of relevant documents, audio-visual materials. 1.Partnership planning period: two groups each have strengths condition just completely complementary partner, for the adaptation of high objects of art combining the demands of public service ,wishes to improve media coverage, and higher attention. 2.Partnership implementation period: there is friendship before cooperation can help communicate and build trust. Continuation of the previous experience of cooperation and consultation and sharing of experiences together to establish cooperative mode. Cooperation mode according to concert production process is divided into lead times, production / promotional period, performances period and closing, the four stages. The division of administrative work practices and performances in the propaganda of the period. Administrative work of propaganda and performance of the division by both side work together. 3.Valuation of Partnership: Cooperation results reached a basic spectators attend performances, ideas and common goals to promote the effectiveness of fund-raising. Blue sky chorus reach savings activity costs, reduce the administrative workload of labor. Shu-gun Association Charity concert per session average balance of the General Fund of about 400,000 yuan, accounting for the actual amount of annual contributions to an average of about 17%. Review and improve matters: 1 .audience attendance mitigation; 2 fund-raising tends to decrease the amount; 3. to improve its efficiency of advertising and ticketing; 4. Charity Concert in the form of diversification. The two sides to respect each other, need each other, cultivate understanding, cooperation happy, happy to continue to maintain partnerships to facilitate forward the idea of the purpose of their respective organizations. Conclusions: 1 In partnership charity concerts performing arts groups must have a considerable level sufficient to attract the audience, and are willing to unpaid charity. 2. The non-profit organization must be able to mobilize volunteers reliable indeed perform administrative work of art. 3. Charity concert fare set terms of promotion for the purpose of maximizing income rather want to maximize the audience, it must make more effort in terms of fund-raising and apply for a grant in order to have balance, to achieve the desired performance. 4. Cooperation of both organizations agree with the idea of each other, care for each other, meaning together partnerships of practice, in order to share a win-win benefits.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Blum Blum Shub"

1

Sa man tian kong de ji mo: Beyond the blue. Tai bei shi: Xi dai, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shui hua lan zao sheng wu xue: The biology of water-blooms blue-green algae. Beijing: Ke xue chu ban she, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shui hua lan zao sheng wu xue: The biology of water-blooms blue-green algae. Beijing: Ke xue chu ban she, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bai fang zi, lan ping zi: She hui bian yuan ren xin ling xiao shuo = The white house, blue bottles / Victor Fan. Taibei Shi: Niang chu ban, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hegland, Frode, ed. The Future of Text. Future Text Publishing, 2020. http://dx.doi.org/10.48197/fot2020a.

Full text
Abstract:
This book is the first anthology of perspectives on the future of text, one of our most important mediums for thinking and communicating, with a Foreword by the co-inventor of the Internet, Vint. Cerf and a Postscript by the founder of the modern Library of Alexandria, Ismail Serageldin. In a time with astounding developments in computer special effects in movies and the emergence of powerful AI, text has developed little beyond spellcheck and blue links. In this work we look at myriads of perspectives to inspire a rich future of text through contributions from academia, the arts, business and technology. We hope you will be as inspired as we are as to the potential power of text truly unleashed. Contributions by Adam Cheyer • Adam Kampff • Alan Kay • Alessio Antonini • Alex Holcombe • Amaranth Borsuk • Amira Hanafi • Amos Paul Kennedy Jr. • Anastasia Salter • Andy Matuschak & Michael Nielsen • Ann Bessemans & María Pérez Mena • Andries Van Dam • Anne-Laure Le Cunff • Anthon Botha • Azlen Ezla • Barbara Beeton • Belinda Barnet • Ben Shneiderman • Bernard Vatant • Bob Frankston • Bob Horn • Bob Stein • Catherine C. Marshall • Charles Bernstein • Chris Gebhardt • Chris Messina • Christian Bök • Christopher Gutteridge • Claus Atzenbeck • Daniel Russel • Danila Medvedev • Danny Snelson • Daveed Benjamin • Dave King • Dave Winer • David De Roure • David Jablonowski • David Johnson • David Lebow • David M. Durant • David Millard • David Owen Norris • David Price • David Weinberger • Dene Grigar • Denise Schmandt-Besserat • Derek Beaulieu • Doc Searls • Don Norman • Douglas Crockford • Duke Crawford • Ed Leahy • Elaine Treharne • Élika Ortega • Esther Dyson • Esther Wojcicki • Ewan Clayton • Fiona Ross • Fred Benenson & Tyler Shoemaker • Galfromdownunder, aka Lynette Chiang • Garrett Stewart • Gyuri Lajos • Harold Thimbleby • Howard Oakley • Howard Rheingold • Ian Cooke • Iian Neil • Jack Park • Jakob Voß • James Baker • James O’Sullivan • Jamie Blustein • Jane Yellowlees Douglas • Jay David Bolter • Jeremy Helm • Jesse Grosjean • Jessica Rubart • Joe Corneli • Joel Swanson • Johanna Drucker • Johannah Rodgers • John Armstrong • John Cayle • John-Paul Davidson • Joris J. van Zundert • Judy Malloy • Kari Kraus & Matthew Kirschenbaum • Katie Baynes • Keith Houston • Keith Martin • Kenny Hemphill • Ken Perlin • Leigh Nash • Leslie Carr • Lesia Tkacz • Leslie Lamport • Livia Polanyi • Lori Emerson • Luc Beaudoin & Daniel Jomphe • Lynette Chiang • Manuela González • Marc-Antoine Parent • Marc Canter • Mark Anderson • Mark Baker • Mark Bernstein • Martin Kemp • Martin Tiefenthaler • Maryanne Wolf • Matt Mullenweg • Michael Joyce • Mike Zender • Naomi S. Baron • Nasser Hussain • Neil Jefferies • Niels Ole Finnemann • Nick Montfort • Panda Mery • Patrick Lichty • Paul Smart • Peter Cho • Peter Flynn • Peter Jenson & Melissa Morocco • Peter J. Wasilko • Phil Gooch • Pip Willcox • Rafael Nepô • Raine Revere • Richard A. Carter • Richard Price • Richard Saul Wurman • Rollo Carpenter • Sage Jenson & Kit Kuksenok • Shane Gibson • Simon J. Buckingham Shum • Sam Brooker • Sarah Walton • Scott Rettberg • Sofie Beier • Sonja Knecht • Stephan Kreutzer • Stephanie Strickland • Stephen Lekson • Stevan Harnad • Steve Newcomb • Stuart Moulthrop • Ted Nelson • Teodora Petkova • Tiago Forte • Timothy Donaldson • Tim Ingold • Timur Schukin & Irina Antonova • Todd A. Carpenter • Tom Butler-Bowdon • Tom Standage • Tor Nørretranders • Valentina Moressa • Ward Cunningham • Dame Wendy Hall • Zuzana Husárová. Student Competition Winner Niko A. Grupen, and competition runner ups Catherine Brislane, Corrie Kim, Mesut Yilmaz, Elizabeth Train-Brown, Thomas John Moore, Zakaria Aden, Yahye Aden, Ibrahim Yahie, Arushi Jain, Shuby Deshpande, Aishwarya Mudaliar, Finbarr Condon-English, Charlotte Gray, Aditeya Das, Wesley Finck, Jordan Morrison, Duncan Reid, Emma Brodey, Gage Nott, Aditeya Das and Kamil Przespolewski. Edited by Frode Hegland.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Blum Blum Shub"

1

Boneh, Dan. "Blum–Blum–Shub Pseudorandom Bit Generator." In Encyclopedia of Cryptography and Security, 160–61. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shparlinski, Igor. "RSA and Blum—Blum—Shub Generators." In Cryptographic Applications of Analytic Number Theory, 249–70. Basel: Birkhäuser Basel, 2003. http://dx.doi.org/10.1007/978-3-0348-8037-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Klein, Andreas. "The Blum-Blum-Shub Generator and Related Ciphers." In Stream Ciphers, 241–57. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5079-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Galeotti, Lorenzo. "Surreal Blum-Shub-Smale Machines." In Computing with Foresight and Industry, 13–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22996-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sidorenko, Andrey, and Berry Schoenmakers. "Concrete Security of the Blum-Blum-Shub Pseudorandom Generator." In Cryptography and Coding, 355–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11586821_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shparlinski, Igor. "RSA and Blum—Blum—Shub Generators of Pseudo-Random Numbers." In Number Theoretic Methods in Cryptography, 131–41. Basel: Birkhäuser Basel, 1999. http://dx.doi.org/10.1007/978-3-0348-8664-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koepke, Peter, and Benjamin Seyfferth. "Towards a Theory of Infinite Time Blum-Shub-Smale Machines." In Lecture Notes in Computer Science, 405–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30870-3_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Durand-Lose, Jérôme. "Abstract Geometrical Computation and the Linear Blum, Shub and Smale Model." In Lecture Notes in Computer Science, 238–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73001-9_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Carl, Merlin. "The Lost Melody Theorem for Infinite Time Blum-Shub-Smale Machines." In Lecture Notes in Computer Science, 71–81. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80049-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brimkov, Valentin E., and Stefan S. Dantchev. "On the Complexity of Integer Programming in the Blum-Shub-Smale Computational Model." In Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics, 286–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44929-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Blum Blum Shub"

1

Koopahi, Elnaz, and Shahram Etemadi Borujeni. "Secure scan-based design using Blum Blum Shub algorithm." In 2016 IEEE East-West Design & Test Symposium (EWDTS). IEEE, 2016. http://dx.doi.org/10.1109/ewdts.2016.7807656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Panda, Amit Kumar, and Kailash Chandra Ray. "Design and FPGA Prototype of 1024- bit Blum-Blum-Shub PRBG Architecture." In 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP). IEEE, 2018. http://dx.doi.org/10.1109/icicsp.2018.8549715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maksymovych, Volodymyr, and Andrii Malohlovets. "Design and FPGA prototype of modified Blum-Blum-Shub pseudorandom sequence generator." In 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET). IEEE, 2020. http://dx.doi.org/10.1109/tcset49122.2020.235546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Omorog, Challiz D., Bobby D. Gerardo, and Ruji P. Medina. "Enhanced pseudorandom number generator based on Blum-Blum-Shub and elliptic curves." In 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2018. http://dx.doi.org/10.1109/iscaie.2018.8405483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sari, Rita Novita, and Ratna Sri Hayati. "Beaufort Cipher Algorithm Analysis Based on the Power Lock-Blum Blum Shub in Securing Data." In 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2018. http://dx.doi.org/10.1109/citsm.2018.8674368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Omorog, Challiz D., Bobby D. Gerardo, and Ruji P. Medina. "The Performance of Blum-Blum-Shub Elliptic Curve Pseudorandom Number Generator as WiFi Protected Access 2 Security Key Generator." In ICBIM '18: The 2nd International Conference on Business and Information Management. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3278252.3278262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mutama, Kuda R. "Steam Turbine Valve Testing, Inspection and Maintenance to Avoid Turbine Overspeed Events." In ASME 2011 Power Conference collocated with JSME ICOPE 2011. ASMEDC, 2011. http://dx.doi.org/10.1115/power2011-55150.

Full text
Abstract:
Steam turbine valves are the most important components before a steam turbine for the admission and control of steam flow. Steam turbine valve configurations can be all in one body or as individual valves for the large units, for the main stop (throttle) and control functions for each section of the steam turbine. Today’s thermal power plants for drum or once-through type supercritical boilers produce very high temperature steam in the final superheat and reheat section of 1055 °F or higher requiring special boiler tube metal alloys, some of which are subject to steam oxidation as in austenitic steels. The oxidation material is mainly in the form of iron oxide or magnetite which is subject to exfoliation. The exfoliated oxide material is carried over to the steam turbine valves and to the high and intermediate pressure turbines. The effect of exfoliated oxide material in valve and turbine components is to cause solid particle erosion (SPE) and therefore shortening the life of those parts due to damage. As time goes by if valves are not tested and do not meet their inspection and maintenance schedule they will build up oxidation material to form scale material called blue blush and eventually they stick and will not shut properly.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Blum Blum Shub"

1

Tagestad, Jerry D., and Janelle L. Downs. Landscape Measures of Rangeland Condition in the BLM Owyhee Pilot Project: Shrub Canopy Mapping, Vegetation Classification, and Detection of Anomalous Land Areas. Office of Scientific and Technical Information (OSTI), December 2007. http://dx.doi.org/10.2172/1028601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography