Random Numbers with LFSR (Linear Feedback Shift Register) - Computerphile
A simple bit-shift operation can generate amazing random strings of numbers. Dr Mike Pound explains then codes it in Python.
If you want to know more about how XOR works: https://www.youtube.com/watch?v=VPw9vPN-3ac
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Random Numbers with LFSR (Linear Feedback Shift Register) - Computerphile канала Computerphile
If you want to know more about how XOR works: https://www.youtube.com/watch?v=VPw9vPN-3ac
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Random Numbers with LFSR (Linear Feedback Shift Register) - Computerphile канала Computerphile
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Transport Layer Security (TLS) - Computerphile](https://i.ytimg.com/vi/0TLDTodL7Lc/default.jpg)
![WiFi's Hidden ____ Problem - Computerphile](https://i.ytimg.com/vi/UgQM0rVDIQE/default.jpg)
![Elliptic Curve Back Door - Computerphile](https://i.ytimg.com/vi/nybVFJVXbww/default.jpg)
![Running an SQL Injection Attack - Computerphile](https://i.ytimg.com/vi/ciNHn38EyRc/default.jpg)
![](https://i.ytimg.com/vi/eCvzuBj_Uqc/default.jpg)
![Chacha Cipher - Computerphile](https://i.ytimg.com/vi/UeIpq-C-GSA/default.jpg)
![Depth Camera - Computerphile](https://i.ytimg.com/vi/bRkUGqsz6SI/default.jpg)
![Running a Buffer Overflow Attack - Computerphile](https://i.ytimg.com/vi/1S0aBV-Waeo/default.jpg)
![Log4J & JNDI Exploit: Why So Bad? - Computerphile](https://i.ytimg.com/vi/Opqgwn8TdlM/default.jpg)
![SHA: Secure Hashing Algorithm - Computerphile](https://i.ytimg.com/vi/DMtFhACPnTY/default.jpg)
![Cracking Enigma in 2021 - Computerphile](https://i.ytimg.com/vi/RzWB5jL5RX0/default.jpg)
![Hacking Out of a Network - Computerphile](https://i.ytimg.com/vi/h7IeCPhTBxs/default.jpg)
![AES Explained (Advanced Encryption Standard) - Computerphile](https://i.ytimg.com/vi/O4xNJsjtN6E/default.jpg)
![TLS Handshake Explained - Computerphile](https://i.ytimg.com/vi/86cQJ0MMses/default.jpg)
![Taming Kerberos - Computerphile](https://i.ytimg.com/vi/qW361k3-BtU/default.jpg)
![Cookie Stealing - Computerphile](https://i.ytimg.com/vi/T1QEs3mdJoc/default.jpg)
![Recreating Dennis Ritchie's PhD Thesis - Computerphile](https://i.ytimg.com/vi/82TxNejKsng/default.jpg)
![Maze Solving - Computerphile](https://i.ytimg.com/vi/rop0W4QDOUI/default.jpg)
![How TOR Works- Computerphile](https://i.ytimg.com/vi/QRYzre4bf7I/default.jpg)
![The Most Difficult Program to Compute? - Computerphile](https://i.ytimg.com/vi/i7sm9dzFtEI/default.jpg)