Cryptographically secure pseudorandom number generator

Results: 62



#Item
11Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2013-12-16 07:37:43
12Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2013-12-16 07:37:43
13Information theory / Fortuna / Key management / Entropy / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptographic hash function / Key / Cryptography / Pseudorandom number generators / Randomness

Cryptography Engineering: Design Principles and Practical Applications

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-07 19:29:27
14Monte Carlo methods / RC4 / Permutations / Randomness / Fisher–Yates shuffle / Cryptographically secure pseudorandom number generator / Distinguishing attack / Normal distribution / Stream cipher / Cryptography / Mathematics / Pseudorandom number generators

Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak www.vmpcfunction.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-06 10:02:01
15Pseudorandom number generators / Information theory / Entropy / Random number generation / Key / Cryptographically secure pseudorandom number generator / Fortuna / Cryptography / Randomness / Thermodynamic entropy

On Randomness Version 0.1 Ben Laurie http://www.apache-ssl.org/ben.html December 29, 2004

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:33
16Information theory / Random number generation / Entropy / Randomness tests / Key / Hash function / Cryptographic hash function / Statistical randomness / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

Entropy Key The Entropy Key is a small, affordable and easily installed high-quality random number generator that attaches to any free USB socket. Along with its two isolated and shielded noise generators, it has a 72M

Add to Reading List

Source URL: www.entropykey.co.uk

Language: English - Date: 2009-09-08 13:12:18
17Data Encryption Standard / Block cipher / Cipher / Triple DES / Stream cipher / Block size / Advantage / Padding / Initialization vector / Cryptography / Cryptographically secure pseudorandom number generator / One-time pad

USOO8712040B2[removed]Unlted States Patent (10) Patent N0.2

Add to Reading List

Source URL: www.brotherstechnology.com

Language: English - Date: 2014-06-20 20:32:00
18Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
19Information theory / Formal sciences / Key / Entropy / Cryptographically secure pseudorandom number generator / Randomness extractor / Cryptography / Randomness / Pseudorandom number generators

Microsoft PowerPoint - dp-slides

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:27
20Information theory / Pseudorandomness / Random number generation / Hardware random number generator / National Security Agency / Cryptographic hash function / Entropy / Block cipher / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

NIST Special Publication[removed]Recommendation for Random Number Generation Using Deterministic Random Bit Generators Elaine Barker

Add to Reading List

Source URL: web.archive.org

Language: English
UPDATE