“…Crypto-resistant include: based on streaming ciphers (e.g., Dragon-128, SEAL, RC4, RC5, RC6, Grain, Yamb, Phelix), based on block ciphers (for example, GOST 28147-89, AES, ANSI X9.17, DES), based on one-way functions (for example, BBS, RSA, Dual_EC_DRBG (elliptic curves), GPSSD (linear codes), etc.) and non-crypto-resistant: based on elementary recursors (for example, linear congruent, polynomial congruent, additive Fibonacci, additive Fibonacci delayed and multiplicative Fibonacci delayed PRNG), based on operations in finite fields (for example, Genoa generators, Golman, and others) [20,21,24,27].…”