2 \item Fields of Applications:
4 \item Security: hash function, steganography, stream cipher
5 \item Time Synchronization: GPS
6 \item Numerical simulations: Monte-Carlo algorithms
7 \item<2->Simulation of Chaotic systems: double pendulum, protein dynamics
9 \item Practical requirements:
11 \item Reproducibility: same seed $\leadsto$ same stream
12 \item Successfull pass on PRNG batteries of tests:
13 the NIST \footnote{E.~Barker and A.~Roginsky.
14 \newblock Draft {N}{I}{S}{T} special publication 800-131 recommendation for the
15 transitioning of cryptographic algorithms and key sizes, 2010.},
16 and DieHARD~\footnote{G.~Marsaglia.
17 \newblock Diehard: a battery of tests of randomness.
18 \newblock {\em http://stat.fsu.edu/~geo/diehard.html}, 1996}
19 \item<2-> Should have chaotic properties if needed