Pseudorandom number generator

Results: 243



#Item
121Electronic commerce / Identity management / Credential / SHA-2 / Proof of knowledge / Pseudorandom number generator / RSA / SHA-1 / Cryptography / Cryptographic hash functions / Cryptographic protocols

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 05:32:30
122Probability and statistics / Pseudorandom number generators / Diehard tests / Random number generation / George Marsaglia / Hardware random number generator / Multiply-with-carry / Normal distribution / Generator / Randomness / Cryptography / Statistics

New URL: http://www.R-project.org/conferences/DSC[removed]DSC 2001 Proceedings of the 2nd International Workshop on Distributed Statistical Computing March 15-17, Vienna, Austria http://www.ci.tuwien.ac.at/Conferences/DSC

Add to Reading List

Source URL: www.r-project.org

Language: English - Date: 2014-02-10 03:17:56
123Pseudorandom number generators / Information theory / State functions / Hardware random number generator / FIPS 140 / Random number generation / Entropy / Key generation / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Cryptography standards

Testing SP 800-90B Entropy Sources

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 12:46:33
124Algorithm / Mathematical logic / Theoretical computer science / Validation / Pseudorandom number generator / Verification and validation / Science / Logic / Philosophy of science / Pharmaceutical industry / Validity / Systems engineering

Sharon Keller  To provide assurance that the algorithm has been

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 09:32:21
125Information theory / Thermodynamic entropy / Probability and statistics / State functions / Entropy / Hardware random number generator / Random number generation / Randomness / Cryptography / Pseudorandom number generators

Random Bit Generator Constructions Elaine Barker NIST December 5, 2012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 14:30:38
126Binary arithmetic / Cryptographically secure pseudorandom number generator / Parity bit / RSA / Boolean algebra / FO / XTR / Blum Blum Shub / Blum–Goldwasser cryptosystem / Cryptography / Pseudorandom number generators / Electronic commerce

--- Efficient and Secure Pseudo-Random Number Generation. (Extended Abstract) Umesh V. Vazirani *

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2005-06-09 20:48:30
127Applied mathematics / Probability and statistics / Pseudorandom number generators / Entropy / Statistical theory / Hardware random number generator / Random number generation / /dev/random / Min-entropy / Randomness / Cryptography / Information theory

RBG Workshop (December[removed]Entropy Sources and You: An Overview of SP 800-90B

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 09:35:31
128Fortuna / Entropy / Random number generation / Stream cipher / Cryptographic hash function / Hash function / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Key generation

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
129Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
130Pseudorandomness / Randomness / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Random number generation / Random seed / Random permutation / One-way function / Cryptography / Theoretical computer science / Applied mathematics

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
UPDATE