Key generator

Results: 91



#Item
51Pseudorandom number generators / Information theory / Formal sciences / Random number generation / Hardware random number generator / Entropy / Key / Principle of maximum entropy / Randomness tests / Cryptography / Randomness / Probability and statistics

Random number generators for cryptography – design, evaluation and tests Viktor Fischer Hubert Curien Laboratory, Jean Monnet University Saint-Etienne, France Random numbers are crucial in cryptography: they are used a

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-06-17 09:40:30
52Electronic test equipment / Hewlett-Packard / Synthesizer / Function key / Signal generator / Music / Computing / Technology

Notice Hewlett-Packard to Agilent Technologies Transition This documentation supports a product that previously shipped under the HewlettPackard company brand name. The brand name has now been changed to Agilent Technolo

Add to Reading List

Source URL: www.naic.edu

Language: English - Date: 2012-09-10 11:24:00
53Pseudorandom number generators / Information theory / State functions / Hardware random number generator / FIPS 140 / Random number generation / Entropy / Key generation / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Cryptography standards

Testing SP 800-90B Entropy Sources

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 12:46:33
54Fortuna / Entropy / Random number generation / Stream cipher / Cryptographic hash function / Hash function / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Key generation

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
55Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
56Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
57Pseudorandomness / Randomness / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Random number generation / Random seed / Random permutation / One-way function / Cryptography / Theoretical computer science / Applied mathematics

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
58Triple DES / AES implementations / Cryptographically secure pseudorandom number generator / Cryptography / Advanced Encryption Standard / Data Encryption Standard

NIST-Recommended Random Number Generator Based on ANSI X9.31 Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms January 31, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
59Block cipher / Key generation / Symmetric-key algorithm / Random number generation / Pseudorandomness / Key / Public-key cryptography / Cryptographically secure pseudorandom number generator / Cryptography standards / Cryptography / Key management / Randomness

Why Random Numbers for Cryptography? Miles Smid Orion Security Solutions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:04:24
60CRYPTREC / Cryptographic hash functions / Differential cryptanalysis / NESSIE / Cryptanalysis / Alternating step generator / Data Encryption Standard / Cryptosystem / Symmetric-key algorithm / Cryptography / Stream ciphers / Block ciphers

RTF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
UPDATE