Pseudorandom number generators

Results: 265



#Item
31The Conditional Correlation Attack:  A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-09-01 16:50:50
32IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
33Random Number Generator Certificate  Operator: BWIN.PARTY URL: www.partypoker.com

Random Number Generator Certificate Operator: BWIN.PARTY URL: www.partypoker.com

Add to Reading List

Source URL: pl.partypoker.com

Language: English - Date: 2015-03-03 00:39:40
34Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Random Number Generators —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Random Number Generators —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
35Security not by chance: the AltusMetrum hardware true random number generator Tom Marble  DebConf 14

Security not by chance: the AltusMetrum hardware true random number generator Tom Marble DebConf 14

Add to Reading List

Source URL: info9.net

Language: English - Date: 2014-08-27 11:34:09
36A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il  Abstract. RC4 is the most widely deployed

A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4 is the most widely deployed

Add to Reading List

Source URL: saluc.engr.uconn.edu

Language: English - Date: 2006-02-21 13:57:34
37Nonuniform Cellular Automata for Cryptography

Nonuniform Cellular Automata for Cryptography

Add to Reading List

Source URL: www.complex-systems.com

Language: English - Date: 2012-09-20 14:36:17
38Analysis of various scalar, vector, and parallel implementations of RandomAccess∗ Piotr Luszczek Jack Dongarra

Analysis of various scalar, vector, and parallel implementations of RandomAccess∗ Piotr Luszczek Jack Dongarra

Add to Reading List

Source URL: icl.cs.utk.edu

Language: English - Date: 2010-06-17 21:10:41
39

PDF Document

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2007-10-09 11:15:54
40.  The Dual Elliptic Curve Deterministic RBG .  Background, Specification, Security and Notes

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50