Pseudorandom generator

Results: 304



#Item
41Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Random Number Generators —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Random Number Generators —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
42Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak†  Avi Wigderson‡

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:30
43Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
44On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti∗ Yilei Chen†

On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti∗ Yilei Chen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 00:12:34
45Journal of Computer and System Sciences–737  Contents lists available at ScienceDirect Journal of Computer and System Sciences www.elsevier.com/locate/jcss

Journal of Computer and System Sciences–737 Contents lists available at ScienceDirect Journal of Computer and System Sciences www.elsevier.com/locate/jcss

Add to Reading List

Source URL: math.mit.edu

Language: English - Date: 2011-03-23 10:26:18
46Security not by chance: the AltusMetrum hardware true random number generator Tom Marble  DebConf 14

Security not by chance: the AltusMetrum hardware true random number generator Tom Marble DebConf 14

Add to Reading List

Source URL: info9.net

Language: English - Date: 2014-08-27 11:34:09
47Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗  Christina Brzuska‡

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 07:10:50
48Analysis of various scalar, vector, and parallel implementations of RandomAccess∗ Piotr Luszczek Jack Dongarra

Analysis of various scalar, vector, and parallel implementations of RandomAccess∗ Piotr Luszczek Jack Dongarra

Add to Reading List

Source URL: icl.cs.utk.edu

Language: English - Date: 2010-06-17 21:10:41
49The Circuit-Input Game, Natural Proofs, and Testing Circuits With Data∗ Brynmor Chapman† Stanford University

The Circuit-Input Game, Natural Proofs, and Testing Circuits With Data∗ Brynmor Chapman† Stanford University

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2014-12-10 16:56:25
50RngStreams Multiple independent streams of pseudo-random numbers Version: 1.0 Date: 24 DecemberPierre L’Ecuyer

RngStreams Multiple independent streams of pseudo-random numbers Version: 1.0 Date: 24 DecemberPierre L’Ecuyer

Add to Reading List

Source URL: statistik.wu-wien.ac.at

Language: English - Date: 2005-12-24 08:30:10