search for: lcg

Displaying 20 results from an estimated 24 matches for "lcg".

Did you mean: lc
2018 Dec 28
1
[PATCH nbdkit] common: Improve pseudo-random number generation.
...ryptographically secure random numbers in two places, the error filter (to inject errors at random) and the random plugin. For this we have used either random_r or a home-brew-ish Linear Congruential Generator. Use of random_r is problematic on BSDs because it doesn't exist there. Use of the LCG is simply a bad choice. Replace both uses with a better quality and faster PRNG from David Blackman and Sebastiano Vigna called ‘xoshiro256** 1.0’ (http://xoshiro.di.unimi.it/). This is licensed under a public-domain license so it compatible with the licensing of nbdkit. This also fixes a bug in...
2018 Dec 28
0
[PATCH v2 nbdkit] common: Improve pseudo-random number generation.
...ryptographically secure random numbers in two places, the error filter (to inject errors at random) and the random plugin. For this we have used either random_r or a home-brew-ish Linear Congruential Generator. Use of random_r is problematic on BSDs because it doesn't exist there. Use of the LCG is simply a bad choice. Replace both uses with a better quality and faster PRNG from David Blackman and Sebastiano Vigna called ‘xoshiro256** 1.0’ (http://xoshiro.di.unimi.it/). This is released into the public domain (where possible) so it compatible with the licensing of nbdkit. This also fixe...
2018 Dec 28
2
[PATCH v2 nbdkit] common: Improve pseudo-random number generation.
v2: - Fix seeding. - Add a test that nbdkit-random-plugin is producing something which looks at least somewhat random. Rich.
2004 Feb 29
1
LCG with modulo 2^30
I can't run a function which generates random numbrers using linear congruential generator. My multiplier is a=5+8^6, increment is b=1 and modulo is m=2^30. the code I have written works for modulo upto m=2^28. For m= 2^29 , it says, can not allocate memory for the vector or something like that. For m= 2^31 or more, its says the argument "for i in 1:m " is too large in
2018 Dec 31
1
Re: [PATCH v2 nbdkit] common: Improve pseudo-random number generation.
...ure random numbers in two > places, the error filter (to inject errors at random) and the random > plugin. For this we have used either random_r or a home-brew-ish > Linear Congruential Generator. Use of random_r is problematic on BSDs > because it doesn't exist there. Use of the LCG is simply a bad > choice. > > Replace both uses with a better quality and faster PRNG from David > Blackman and Sebastiano Vigna called ‘xoshiro256** 1.0’ > (http://xoshiro.di.unimi.it/). This is released into the public > domain (where possible) so it compatible with the licens...
2016 Jun 17
0
Fwd: [codec] Last proposal for the update draft
...ound 16 kb/s. At those rates, we sometimes only have enough bits to code a single CELT band (8 - 9.6 kHz). When that happens in hybrid mode (unlike CELT-only), the second band (CELT band 18, from 9.6 to 12 kHz) cannot use folding because it is wider than the amount already coded, and falls back to LCG noise. Because it can also happen on transients (e.g. stops), it can cause audible pre-echo. My proposed solution is to fix the folding behaviour so that it is never forced to fall back to LCG due to not enough folding data. This is achieved by simply repeating part of the first band in the foldin...
2013 Aug 28
2
[LLVMdev] Adding diversity for security (and testing)
...(This is a pretty strange one, but it's possible.) The attacker is forced to rely on side channel information such as timing channels in an attempt to discover the length of the inserted NOP sleds. This sounds like an extraordinarily difficult task, but possibly doable. With a weak PRNG like a LCG, for example, you may have sufficient information to break it [2] (I believe there are better attacks, but this is the first that came up with a quick search). 3. Remote attacker who can use a memory disclosure bug to read the contents of the memory. Like attacker 1, the defense can be bypassed....
2011 Apr 30
10
How to check if a package exists
Dear all, I''m trying to do this. Say for example, I want this link: "liblcgdm.so -> liblcgdm.so.1.8.0" to be present on the client only if "lcgdm- libs-1.8.0-1sec.sl5" is already listed. I already have this to create the link: file { ''liblcgdm.so'': ensure => symlink, name => ''/opt/lcg/lib/liblcgdm.so'&...
2012 Mar 06
3
Inherited node tagging
Dear all, I have observed a behavior that doesn''t seem (to me) to match the documentation. Specially, about tagging, the doc says: " Automatic Tagging All language statements enclosed in a node, define or class structure (read more about puppet control structures [[Language Tutorial]] ) will automatically be tagged with the name of that statement. These automatically- applied
2012 Mar 25
1
how to speed up OpenSSH command execution (and a speed analysis)
...uot; (0.126s), but all other times I've tested it was around 0.169s. Control Master setup: Host * ControlPath ~/.ssh/master-%l-%r@%h:%p ControlMaster auto 5) SSH with ControlMaster: Opening the background control master: # ssh -f -N nagtest@@host.example.org # time ssh nagtest at lcg-lrz-dc20.grid.lrz-muenchen.de /usr/lib/nagios/plugins/check_load -w 15,10,5 -c 30,25,20 OK - load average: 0.00, 0.00, 0.00|load1=0.000;15.000;30.000;0; load5=0.000;10.000;25.000;0; load15=0.000;5.000;20.000;0; real 0m0.045s user 0m0.004s sys 0m0.000s => Fastest result with SSH so far. 6) S...
2014 Apr 18
2
[LLVMdev] multithreaded performance disaster with -fprofile-instr-generate (contention on profile counters)
...ters: if ((fast_random() % (1 << > counter)) == 0) counter++; > > This option did not receive any attention. While it has O(1) memory > consumption and reduces contention. > Note that there are several tunables here: first -- how implement > fast_rand: it can be a per-thread LCG, or per-thread counter or set of > counter, or something else; second -- frequency of increment, e.g. it > actually can be additive and/or bounded (because if we reduce frequency of > increments by 1000x, this must be enough). > > > > > In Google GCC, we implemented another...
2013 Aug 28
0
[LLVMdev] Adding diversity for security (and testing)
...(This is a pretty strange one, but it's possible.) The attacker is forced to rely on side channel information such as timing channels in an attempt to discover the length of the inserted NOP sleds. This sounds like an extraordinarily difficult task, but possibly doable. With a weak PRNG like a LCG, for example, you may have sufficient information to break it [2] (I believe there are better attacks, but this is the first that came up with a quick search). Hi Stephen, Thanks for spelling out the possible attack models in detail. This is pretty much the way we were thinking. However, I wanted...
2007 Apr 24
5
Random Number Generator of Park and Miller
Hi, I failed to search for R package providing random number generator of "Park and Miller". Anyone know any R package supporting this kind of function? Thanks, Grace -- View this message in context: http://www.nabble.com/Random-Number-Generator-of-Park-and-Miller-tf3636501.html#a10154554 Sent from the R help mailing list archive at Nabble.com.
2010 Feb 26
3
Dovecot 2.0b3 IDLE not advertised
Hi, I'm not sure whether the client or the server is at fault (probably the client), but it's clearly a regression for me. I'm using the LCG Profimail (http://lonelycatgames.com/?app=profimail) application for my Symbian smartphone which has quite decent IMAP capabilities. Amongst others it can do IMAP IDLE (which has to be statically enabled in the server settings, so it's not used based on the server capabilities). After upgradi...
2013 Aug 28
0
[LLVMdev] Adding diversity for security (and testing)
On Mon, Aug 26, 2013 at 9:14 PM, Todd Jackson <quantum.skyline at gmail.com>wrote: > > > We would also include a secure random number generator which links >> > against OpenSSL. This would of course be an optional module disabled >> > by default, but is necessary so the randomization is cryptographically >> > secure and useful in security applications.
2013 Sep 19
2
[LLVMdev] Adding diversity for security (and testing)
...secure RNG is considered best-practice for any randomness used for security purposes. Since the RNG we are proposing is still very fast, there doesn't appear to be a significant disadvantage to using it. We do need a fallback RNG when OpenSSL is unavailable, and have therefore included a simple LCG as well. I have attached our current patches against r190882, as well as a bit of documentation. Not sure what the next steps here are, but feel free to test out the code and let us know how it goes. - stephen -------------- next part -------------- A non-text attachment was scrubbed... Name: US...
2014 Apr 18
2
[LLVMdev] multithreaded performance disaster with -fprofile-instr-generate (contention on profile counters)
...gt; counter)) == 0) counter++; >>> >>> This option did not receive any attention. While it has O(1) memory >>> consumption and reduces contention. >>> Note that there are several tunables here: first -- how implement >>> fast_rand: it can be a per-thread LCG, or per-thread counter or set of >>> counter, or something else; second -- frequency of increment, e.g. it >>> actually can be additive and/or bounded (because if we reduce frequency of >>> increments by 1000x, this must be enough). >>> >>> >>>...
2013 Aug 27
4
[LLVMdev] Adding diversity for security (and testing)
> > We would also include a secure random number generator which links > > against OpenSSL. This would of course be an optional module disabled > > by default, but is necessary so the randomization is cryptographically > > secure and useful in security applications. > > I am not sure why you need this feature. You can provide LLVM with a > SEED value that can be
2014 Apr 18
4
[LLVMdev] multithreaded performance disaster with -fprofile-instr-generate (contention on profile counters)
On Apr 17, 2014, at 2:04 PM, Chandler Carruth <chandlerc at google.com> wrote: > On Thu, Apr 17, 2014 at 1:27 PM, Justin Bogner <mail at justinbogner.com> wrote: > Chandler Carruth <chandlerc at google.com> writes: > > if (thread-ID != main's thread-ID && shard_count < std::min(MAX, NUMBER_OF_CORES)) { > > shard_count = std::min(MAX,
2016 May 26
19
[Bug 2573] New: dead sessions cannot be closed with ~.
https://bugzilla.mindrot.org/show_bug.cgi?id=2573 Bug ID: 2573 Summary: dead sessions cannot be closed with ~. Product: Portable OpenSSH Version: 3.7.1p2 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5 Component: ssh Assignee: unassigned-bugs at mindrot.org