@inproceedings{3b328f04e359468daca950e95292b5be,
title = "Cryptography based on transcendental numbers",
abstract = "We investigate irrational numbers as a source of pseudorandom bits. We suggest two secure pseudorandom bit generators based on transcendental numbers. These two classes of transcendentals are applied to construct novel encryption algorithms. Properties of the encryption algorithms are studied and preliminary cryptanalysis is given.",
author = "Josef Pieprzyk and Hossein Ghodosi and Chris Charnes and Rei Safavi-Naini",
year = "1996",
language = "English",
isbn = "3540619917",
volume = "1172",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "96--107",
booktitle = "Information Security and Privacy - 1st Australasian Conference, ACISP 1996, Proceedings",
address = "United States",
note = "1st Australasian Conference on Information Security and Privacy, ACISP - 1996 ; Conference date: 24-06-1996 Through 26-06-1996",
}