reviewer, we cannot apply this result. Indeed the first part of the document
does not deal with security, but it investigates the speed, chaos, and
statistical quality of PRNGs. A sentence has been added to clarify this point
reviewer, we cannot apply this result. Indeed the first part of the document
does not deal with security, but it investigates the speed, chaos, and
statistical quality of PRNGs. A sentence has been added to clarify this point