Question
This process is less vulnerable to state compromise extension when it is backtracking-resistant. The so-called “HILL” paper by Håstad, Impagliazzo, Levin, and Luby showed that an algorithm for this process can be constructed from any one-way function. The quadratic residuosity problem is the basis of the security of an algorithm for this process that requires both inputs to be congruent to 3 mod 4. Cryptographically secure algorithms for this process are used to create initialization vectors and nonces, and such algorithms for it must pass the next bit test. A simple algorithm for this process repeatedly performs xorshifts (“X-or-shifts”). The Mersenne (“mair-SEN”) Twister and other algorithms for this process are initialized with a seed. For 10 points, name this process that creates a sequence whose next value cannot be predicted. ■END■
Buzzes
Summary
Tournament | Edition | Exact Match? | TUH | Conv. % | Power % | Neg % | Average Buzz |
---|---|---|---|---|---|---|---|
2024 ACF Nationals | 04/21/2024 | Y | 22 | 95% | 0% | 23% | 103.90 |