<--- Back to Details
First PageDocument Content
Pseudorandomness / Random number generation / Hardware random number generator / National Security Agency / Cryptographic hash function / Block cipher / Cryptographically secure pseudorandom number generator / Dual EC DRBG / Cryptography / Randomness / Pseudorandom number generators
Date: 2012-02-09 09:00:24
Pseudorandomness
Random number generation
Hardware random number generator
National Security Agency
Cryptographic hash function
Block cipher
Cryptographically secure pseudorandom number generator
Dual EC DRBG
Cryptography
Randomness
Pseudorandom number generators

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 1,08 MB

Share Document on Facebook

Similar Documents

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

DocID: 1uEEQ - View Document

Cryptanalysis of TWIS Block Cipher ¨ Onur Ko¸cak and Ne¸se Oztop Institute of Applied Mathematics, Middle East Technical University, Turkey {onur.kocak,noztop}@metu.edu.tr

DocID: 1uxNp - View Document

Improved Linear Cryptanalysis of SMS4 Block Cipher

DocID: 1umoL - View Document

An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

DocID: 1tcCJ - View Document

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document