This process is less vulnerable to state compromise extension when it is backtracking-resistant. The so-called “HILL” paper by Håstad, Impagliazzo, Levin, and Luby showed that an algorithm for this process can be constructed from any one-way function. The quadratic residuosity problem is the basis of the security of an algorithm for this process that requires both inputs to be congruent to 3 mod 4. Cryptographically secure algorithms for this process are used to create initialization vectors and nonces, and such algorithms for it must pass the next bit test. A simple algorithm for this process repeatedly performs xorshifts (“X-or-shifts”). The Mersenne (“mair-SEN”) Twister and other algorithms for this process are initialized with a seed. For 10 points, name this process that creates a sequence whose next value cannot be predicted. ■END■
ANSWER: pseudorandom number generation [or PRNG; accept descriptions of creating sequences of pseudorandom numbers; accept deterministic random bit generation, DRBG, non-deterministic random bit generation, or NRBG; accept pseudorandom string generation or pseudorandom bit string generation; prompt on randomization or word forms of randomness]
<Other Science>
= Average correct buzz position