Pseudorandom number generators

Results: 265



#Item
31Serge Vaudenay / Correlation attack / Technology / Correlation and dependence / Linear feedback shift register / Bluetooth / Computing / Cryptography / Pseudorandom number generators / Covariance and correlation

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-09-01 16:50:50
32Mathematics / Cryptography / Binary arithmetic / Linear feedback shift register / Pseudorandomness / Stream cipher / Information theory / Factor graph / Pseudorandom generator / Pseudorandom number generators / Theoretical computer science / Applied mathematics

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
33Pseudo-ring / Statistical randomness / Mathematics / Pseudorandom number generators / Randomness / Information theory / Random number generation

Random Number Generator Certificate Operator: BWIN.PARTY URL: www.partypoker.com

Add to Reading List

Source URL: pl.partypoker.com

Language: English - Date: 2015-03-03 00:39:40
34Randomness / Pseudorandom number generators / Cryptography standards / Random number generation / Pseudorandomness / FIPS 140-2 / Algorithm / Cryptographically secure pseudorandom number generator / CRYPTREC / Cryptography / Theoretical computer science / Applied mathematics

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Random Number Generators —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
35Device file / Key management / Entropy / /dev/random / Hardware random number generator / Random number generation / Key / Session key / Symmetric-key algorithm / Cryptography / Randomness / Pseudorandom number generators

Security not by chance: the AltusMetrum hardware true random number generator Tom Marble DebConf 14

Add to Reading List

Source URL: info9.net

Language: English - Date: 2014-08-27 11:34:09
36RC4 / Related-key attack / Random variable / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4 is the most widely deployed

Add to Reading List

Source URL: saluc.engr.uconn.edu

Language: English - Date: 2006-02-21 13:57:34
37Applied mathematics / Pseudorandom number generators / Cellular automata / Rule 30 / Cellular automaton / Keystream / One-time pad / Linear feedback shift register / Elementary cellular automaton / Cryptography / Stream ciphers / Mathematics

Nonuniform Cellular Automata for Cryptography

Add to Reading List

Source URL: www.complex-systems.com

Language: English - Date: 2012-09-20 14:36:17
38Computing / Computer hardware / Linear congruential generator / Random number generation / CPU cache / Pseudo-ring / Trie / Pseudorandom number generators / Mathematics / Linear feedback shift register

Analysis of various scalar, vector, and parallel implementations of RandomAccess∗ Piotr Luszczek Jack Dongarra

Add to Reading List

Source URL: icl.cs.utk.edu

Language: English - Date: 2010-06-17 21:10:41
39Pseudorandom number generators / Pseudorandomness / Theoretical computer science / Random number generation / Cryptographically secure pseudorandom number generator / Social peer-to-peer processes / Peer-to-peer / Cryptography / Randomness / Applied mathematics

PDF Document

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2007-10-09 11:15:54
40Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / Factorial / Blum Blum Shub / RBG / One-way function / Mathematics / Pseudorandom number generators / Cryptography

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
UPDATE