First Page | Document Content | |
---|---|---|
![]() Date: 2014-03-07 19:29:27Information theory Fortuna Key management Entropy Random number generation Pseudorandomness Cryptographically secure pseudorandom number generator Cryptographic hash function Key Cryptography Pseudorandom number generators Randomness | Add to Reading List |
![]() | Myriad: Scalable and Expressive Data Generation Alexander Alexandrov∗ Kostas Tzoumas∗ Volker Markl∗DocID: 1nLXu - View Document |
![]() | PDF DocumentDocID: 1j3OJ - View Document |
![]() | Randomness: between faith and reality Yaoyun Shi University of Michigan joint works with Carl Miller (arXiv:&), Kai-Min Chung and Xiaodi Wu (arXiv:)DocID: 1gEF9 - View Document |
![]() | On the Use of Financial Data as a Random Beacon Jeremy Clark University of Waterloo Urs Hengartner University of WaterlooDocID: 1aBtZ - View Document |
![]() | Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Random Number Generators —DocID: 18xt4 - View Document |