Cryptographically secure pseudorandom number generator

Results: 62



#Item
31Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL  if ((err = SSLHashSHA1.update(...)) != 0)

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
32NIST-Recommended Random Number Generator Based on ANSI X9.31 Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms January 31, 2005

NIST-Recommended Random Number Generator Based on ANSI X9.31 Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms January 31, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
33CTR_DRBG[removed]ANSI X9.82, Part 3 – Draft – July[removed]DRBGs Based on Block Ciphers[removed]Discussion

CTR_DRBG[removed]ANSI X9.82, Part 3 – Draft – July[removed]DRBGs Based on Block Ciphers[removed]Discussion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:03:58
34Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:06:54
35Why Random Numbers for Cryptography? Miles Smid Orion Security Solutions

Why Random Numbers for Cryptography? Miles Smid Orion Security Solutions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:04:24
36Comments Received on NIST SP 800-90A (2011)

Comments Received on NIST SP 800-90A (2011)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-11 15:03:51
37The Strategy Behind the Proposed Random Number Generation Standard

The Strategy Behind the Proposed Random Number Generation Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:08:30
38Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee  (Science University of Tokyo)

Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee (Science University of Tokyo)

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
39Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographi
 Pseudorandom Number Generator John Kelsey, Bru
e S
hneier, and Niels Ferguson Counterpane Systems; 101 E Minnehaha Parkway, Minneapolis, MN 55419,

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographi Pseudorandom Number Generator John Kelsey, Bru e S hneier, and Niels Ferguson Counterpane Systems; 101 E Minnehaha Parkway, Minneapolis, MN 55419,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
40

PDF Document

Add to Reading List

Source URL: www.apache-ssl.org

Language: English - Date: 2009-01-02 13:32:33