dev random

Results: 36



#Item
21Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-10-08 05:05:54
22Randomness / Computing platforms / HOTP / Personalization / One-time password / /dev/random / Cross-platform / USB flash drive / Computing / Device file / Information science

Cross-platform YubiKey Personalization Tool User Guide Software Version[removed]Document Version 1.1

Add to Reading List

Source URL: static.yubico.com

Language: English - Date: 2012-05-28 10:47:31
23Randomness / Computing platforms / HOTP / Personalization / One-time password / /dev/random / Cross-platform / USB flash drive / Computing / Device file / Information science

Cross-platform YubiKey Personalization Tool User Guide Software Version[removed]Document Version 1.1

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:04
24Random number generation / Hardware random number generator / /dev/random / Pseudorandom number generator / Entropy / Pseudorandomness / Pseudo-ring / Random sequence / Information theory / Randomness / Cryptography / Applied mathematics

Comments Received on DRAFT ANS X9.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:15:12
25Computing / Cryptography standards / FIPS 140-2 / /dev/random / HP-UX / SHA-2 / PKCS / Cryptlib / CimTrak / Cryptography / Software / Cryptographic software

F-Secure Corporation F-Secure® Cryptographic Library™ FIPS[removed]Validation Security Policy Author: Alexey Kirichenko

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
26Passphrase / NetBSD / /dev/random / PKCS / PBKDF2 / File system / Key generation / Crypt / Cryptography / Cryptography standards / Randomness

CGDCONFIG (8) NetBSD System Manager’s Manual CGDCONFIG (8)

Add to Reading List

Source URL: www.imrryr.org

Language: English - Date: 2004-02-26 15:48:53
27Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: factorable.net

Language: English - Date: 2012-07-02 15:01:16
28Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Add to Reading List

Source URL: www.factorable.net

Language: English - Date: 2012-07-02 15:01:16
29Software / Device file / Mixminion / /dev/random / Configuration file / Tar / Find / Man page / Computing / System software / Unix

MIXMINIONRC (5) System File Formats Manual MIXMINIONRC (5)

Add to Reading List

Source URL: www.mixminion.net

Language: English - Date: 2004-04-01 11:43:52
30Software / Device file / Mixminion / /dev/random / Configuration file / Tar / Find / Man page / Computing / System software / Unix

MIXMINIONRC (5) System File Formats Manual

Add to Reading List

Source URL: mixminion.net

Language: English - Date: 2004-04-01 11:43:52
UPDATE