Pseudorandom number generators

Results: 265



#Item
11Pseudorandom number generators / Cryptography / Randomness / Applied mathematics / Random number generation / Fortuna / Data-intensive computing / Pseudorandomness / Random walk / Cryptographically secure pseudorandom number generator

Myriad: Scalable and Expressive Data Generation Alexander Alexandrov∗ Kostas Tzoumas∗ Volker Markl∗

Add to Reading List

Source URL: stratosphere.eu

Language: English - Date: 2016-05-27 12:05:58
12Cryptography / Computing / Cryptographic protocols / Juniper Networks / Pseudorandom number generators / Cryptographic nonce / Internet protocols / NetScreen Technologies / Challengeresponse authentication / ScreenOS / Internet Key Exchange / DiffieHellman key exchange

A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2016-04-15 12:48:33
13Pseudorandom number generators / Affine cipher / Index of standards articles

TECHNICAL CORRESPONDENCE his correspondence is motivated by two articles in Communications, one of them proposing an "industry standard" r a n d o m n u m b e r generator [10], the other describing machine language

Add to Reading List

Source URL: www.firstpr.com.au

Language: English - Date: 2012-03-14 05:33:31
14Cryptography / Side-channel attacks / Advanced Encryption Standard / Pseudorandom number generators / Data masking / AES implementations / Power analysis / Block cipher / Entropy

Microsoft Word - Reconfig2013_cr_v01.doc

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2013-11-15 15:24:17
15Cryptography / Stream ciphers / Pseudorandom number generators / Linear-feedback shift register / Correlation attack / Self-shrinking generator / Grain / QUAD / Turing / Shrinking generator / Shift register

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 04:05:33
16Pseudorandom number generators / Cryptography / Kleptography / National Institute of Standards and Technology / NIST SP 800-90A / Random number generation / Cryptographic Module Validation Program / FIPS 140-2 / Pseudorandomness / Advanced Encryption Standard / Random seed / Entropy

ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-08-13 08:03:11
17Information theory / Philosophy of thermal and statistical physics / Pseudorandom number generators / Thermodynamic entropy / Information Age / Information flow / Side-channel attack / Entropy / Quicken Interchange Format / Information

FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings) June 29, 2013 Tulane University

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2013-06-11 09:16:04
18Stream ciphers / Pseudorandom number generators / Algebra / Error detection and correction / Binary arithmetic / Linear-feedback shift register / BerlekampMassey algorithm / Correlation attack / Nonlinear feedback shift register / Polynomial / Recurrence relation / Key generator

Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 08:13:04
19Public-key cryptography / E-commerce / Pseudorandom number generators / Key management / Cryptography / RSA / Entropy / Key / Internet

Internet-Wide Scanning and its Measurement Applications Zakir Durumeric University of Michigan RIPE 68 - Measurement, Analysis and Tools Working Group

Add to Reading List

Source URL: zakird.com

Language: English
20Pseudorandom number generators / Cryptography / Multiply-with-carry / Random number generation / Fortuna / Entropy / Random seed / RSA / E0 / Pseudorandomness / Yarrow algorithm / Cryptographically secure pseudorandom number generator

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 04:39:02
UPDATE