Dual EC DRBG

Results: 16



#Item
1Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2016-05-11 07:33:19
2FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
3Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2016-06-07 14:19:23
4The proceedings version of this paper appears in CRYPTOThis is a preliminary full version.  Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. Pat

The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. Pat

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-03 14:14:07
5Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) Constructions

Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-13 09:06:18
6Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2015-03-10 15:36:10
7Microsoft PowerPoint - preneel_snowden_rio_2015v1.pptx

Microsoft PowerPoint - preneel_snowden_rio_2015v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2015-06-29 13:18:07
8.  The Dual Elliptic Curve Deterministic RBG .  Background, Specification, Security and Notes

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
9The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 17:22:13
10DRAFT NIST Special Publication 800-90A, Rev. 1  Recommendation for Random Number Generation Using Deterministic Random Bit Generators

DRAFT NIST Special Publication 800-90A, Rev. 1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 12:37:21