Pseudorandom number generators

Results: 265



#Item
161Information theory / Key management / Fortuna / Entropy / Random number generation / Key generation / Key / Advanced Encryption Standard / Min-entropy / Cryptography / Pseudorandom number generators / Randomness

ANALYSIS OF INTEL’S IVY BRIDGE DIGITAL RANDOM NUMBER GENERATOR PREPARED FOR INTEL BY Mike Hamburg

Add to Reading List

Source URL: www.cryptography.com

Language: English - Date: 2012-06-12 13:35:05
162Information theory / Fortuna / Key generation / Random number generation / Entropy / Niels Ferguson / One-time pad / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographi Pseudorandom Number Generator John Kelsey, Bru e S hneier, and Niels Ferguson Counterpane Systems; 101 E Minnehaha Parkway, Minneapolis, MN 55419,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
163Pseudorandom number generators / Information theory / Entropy / Random number generation / Key / Cryptographically secure pseudorandom number generator / Fortuna / Cryptography / Randomness / Thermodynamic entropy

PDF Document

Add to Reading List

Source URL: www.apache-ssl.org

Language: English - Date: 2009-01-02 13:32:33
164Pseudorandomness / Computational hardness assumptions / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Naor-Reingold Pseudorandom Function / Decisional Diffie–Hellman assumption / Pseudorandom function family / Randomized algorithm / Cryptography / Theoretical computer science / Applied mathematics

Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-16 13:57:22
165Cryptographic software / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Key generation / Pseudorandom number generators / Zeroisation / Key Wrap / HMAC / Cryptography / Cryptography standards / Key management

Microsoft Word[removed]001_Safenet_SecurityPolicy-Rev_D.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-20 09:13:49
166Dual EC DRBG / National Institute of Standards and Technology / Randomness / Security / National security / Random number generation / Nothing up my sleeve number / Random number generator attack / Pseudorandom number generators / Cryptography / National Security Agency

SP[removed], Dual EC, and NIST

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-14 10:03:26
167Randomness / Applied mathematics / Modular arithmetic / Information theory / Random number generation / Linear congruential generator / Lagged Fibonacci generator / White noise / Pseudorandomness / Pseudorandom number generators / Mathematics / Cryptography

Microsoft Word - final_paper_SUPERB2.doc

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2003-08-12 10:30:03
168Applied mathematics / Information theory / Random number generation / Hardware random number generator / Pseudorandomness / Random.org / Entropy / Test suite / Generator / Randomness / Cryptography / Pseudorandom number generators

Microsoft Word - Charmaine Kenny FYP Title Page.doc

Add to Reading List

Source URL: www.random.org

Language: English - Date: 2005-11-24 10:02:51
169Pseudorandom number generators / Applied mathematics / Entropy / Hardware random number generator / Random number generation / Pseudorandomness / Min-entropy / Initialization vector / RBG / Cryptography / Randomness / Information theory

NIST Draft Special Publication 800-90C, Recommendation for Random Bit (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:06:47
170RC4 / Distinguishing attack / Weak key / Keystream / Cryptology ePrint Archive / Cipher / Fluhrer /  Mantin and Shamir attack / Py / Cryptography / Stream ciphers / Pseudorandom number generators

1(4) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson1, Simon Josefsson2 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-29 06:53:59
UPDATE