Cryptographically secure pseudorandom number generator

Results: 62



#Item
21Mathematics / Hardware random number generator / Randomized algorithm / Pseudorandomness / Random number generation / Pseudorandom number generator / Entropy / Random permutation / Cryptographically secure pseudorandom number generator / Randomness / Cryptography / Applied mathematics

The Importance of Reliable Randomness A Note on Random Number Generation and Combinatorial Sampling Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
22Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
23Randomness / Block cipher / Pseudorandomness / National Institute of Standards and Technology / Federal Information Security Management Act / Cryptographic hash function / Random number generation / Cryptographically secure pseudorandom number generator / Dual EC DRBG / Cryptography / Pseudorandom number generators / Applied mathematics

The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 17:22:13
24National Security Agency / Random number generation / Hardware random number generator / Pseudorandomness / Cryptographic hash function / FIPS 140-2 / Block cipher / Dual EC DRBG / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

DRAFT NIST Special Publication 800-90A, Rev. 1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 12:37:21
25Mathematics / Computing / Modular arithmetic / Linear congruential generator / Random number generation / Lagged Fibonacci generator / Generator / Random seed / Cryptographically secure pseudorandom number generator / Pseudorandom number generators / Randomness / Cryptography

Package ‘rsprng’ July 2, 2014 Version 1.0 Date 2010-03-01 Title R interface to SPRNG (Scalable Parallel Random Number Generators) Author Na (Michael) Li

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 16:22:27
26Pseudorandom number generators / Information theory / State functions / Hardware random number generator / FIPS 140 / Random number generation / Entropy / Key generation / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Cryptography standards

Testing SP 800-90B Entropy Sources

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 12:46:33
27Binary arithmetic / Cryptographically secure pseudorandom number generator / Parity bit / RSA / Boolean algebra / FO / XTR / Blum Blum Shub / Blum–Goldwasser cryptosystem / Cryptography / Pseudorandom number generators / Electronic commerce

--- Efficient and Secure Pseudo-Random Number Generation. (Extended Abstract) Umesh V. Vazirani *

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2005-06-09 20:48:30
28Fortuna / Entropy / Random number generation / Stream cipher / Cryptographic hash function / Hash function / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Key generation

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
29Computer security / FIPS 140-2 / Niels Ferguson / National Security Agency / Entropy / Security token / FIPS 140 / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Cryptography standards

SPYRUS Encryption Products are Resistant to Attacks on Dual_EC_DRBG Random Number Generation The New York Times recently reported that the NSA may have inserted an intentional "backdoor” weakness in an encryption algor

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2014-01-06 15:57:43
30Pseudorandom number generators / Cryptographically secure pseudorandom number generator

On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng Dan Shumow Niels Ferguson Microsoft

Add to Reading List

Source URL: www.wired.com

Language: English - Date: 2013-09-18 15:16:44
UPDATE