Dual EC DRBG

Results: 16



#Item
1Cryptography / Computing / Mass surveillance / Cryptographic protocols / Internet protocols / Applied mathematics / RSA Security / Dual EC DRBG / Bullrun / National Security Agency / IPsec / RSA BSAFE

Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2016-05-11 07:33:19
2Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
3Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2016-06-07 14:19:23
4Pseudorandom number generators / Cryptography / Pseudorandomness / Randomness / Information theory / Random number generation / Dual EC DRBG / Fortuna / Pseudorandom generator / RdRand / RSA Security / PRGS

The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. Pat

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-03 14:14:07
5Pseudorandom number generators / Kleptography / National Institute of Standards and Technology / National Security Agency / Cryptography / NIST SP 800-90A / Random number generation / Hardware random number generator / Entropy / Dual EC DRBG / RdRand

Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-13 09:06:18
6Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2015-03-10 15:36:10
7Security / Cryptography / Mass surveillance / Surveillance / Privacy of telecommunications / War on Terror / National Security Agency / Bullrun / Global surveillance disclosures / XKeyscore / Encryption / Dual EC DRBG

Microsoft PowerPoint - preneel_snowden_rio_2015v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2015-06-29 13:18:07
8Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / Factorial / Blum Blum Shub / RBG / One-way function / Mathematics / Pseudorandom number generators / Cryptography

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
9Randomness / Block cipher / Pseudorandomness / National Institute of Standards and Technology / Federal Information Security Management Act / Cryptographic hash function / Random number generation / Cryptographically secure pseudorandom number generator / Dual EC DRBG / Cryptography / Pseudorandom number generators / Applied mathematics

The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 17:22:13
10National Security Agency / Random number generation / Hardware random number generator / Pseudorandomness / Cryptographic hash function / FIPS 140-2 / Block cipher / Dual EC DRBG / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

DRAFT NIST Special Publication 800-90A, Rev. 1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 12:37:21
UPDATE