NIST SP 800-90A

Results: 10



#Item
1Pseudorandom number generators / Kleptography / National Institute of Standards and Technology / National Security Agency / Cryptography / NIST SP 800-90A / Random number generation / Hardware random number generator / Entropy / Dual EC DRBG / RdRand

Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-13 09:06:18
2

NIST SP 800-90A: Recommendation for Random Number Generation Using Deterministic Random Bit Generators (superseded)

Add to Reading List

Source URL: projectbullrun.org

Language: English
    3

    NIST SP 800-90A, Recommendation for Random Number Generations Using Deterministic Random Bit Generations

    Add to Reading List

    Source URL: projectbullrun.org

    Language: English - Date: 2014-03-26 23:26:01
      4Pseudorandom number generators / Cryptography / Kleptography / National Institute of Standards and Technology / NIST SP 800-90A / Random number generation / Cryptographic Module Validation Program / FIPS 140-2 / Pseudorandomness / Advanced Encryption Standard / Random seed / Entropy

      ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-08-13 08:03:11
      5Statistical theory / Finite fields / Applied mathematics / Entropy / Information theory / XTR / Algorithm / Hardware random number generator / Modal logic / Randomness / Logic / Mathematics

      Comments Received on SP 800-90A (December[removed]Jim Nechvatal, NIST ..........................................................................................................2 Bluma Sussman, Contractor for DHS ..........

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-02-23 15:34:29
      6Randomness / Block cipher / Pseudorandomness / National Institute of Standards and Technology / Federal Information Security Management Act / Cryptographic hash function / Random number generation / Cryptographically secure pseudorandom number generator / Dual EC DRBG / Cryptography / Pseudorandom number generators / Applied mathematics

      The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2014-11-20 17:22:13
      7Key size / Key / Digital signature / Crypt / Symmetric-key algorithm / Book:Cryptography / Key Wrap / Cryptography / Key management / Public-key cryptography

      Random Bit Generation (SP 800-90A, B and C)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-09-14 10:04:04
      8SHA-2 / SHA-1 / Advanced Encryption Standard / Cryptographic nonce / Hash function / Cryptography / Cryptographic hash functions / Pseudorandom number generators

      The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS) Updated: February 14, 2013 Previous Update: March 21, 2012 Original: March 10, 2009

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2013-02-14 13:50:49
      9Information theory / Probability and statistics / Statistical theory / Entropy / FIPS 140-2 / Random number generation / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

      Comments Received on NIST SP 800-90A (2011)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2014-06-11 15:03:51
      10Pseudorandom number generators / Entropy / National Security Agency / Advanced Encryption Standard / Cryptographic hash function / Random number generation / Hash function / Key / Crypt / Cryptography / Randomness / Information theory

      Comments on SP 800-90A[removed]Paul Lambert ............................................................................................................................ 2 Ashit Vora, Acumen Security ......................

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2014-06-11 14:30:31
      UPDATE