<--- Back to Details
First PageDocument Content
Information theory / Fortuna / Key management / Entropy / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptographic hash function / Key / Cryptography / Pseudorandom number generators / Randomness
Date: 2014-03-07 19:29:27
Information theory
Fortuna
Key management
Entropy
Random number generation
Pseudorandomness
Cryptographically secure pseudorandom number generator
Cryptographic hash function
Key
Cryptography
Pseudorandom number generators
Randomness

Cryptography Engineering: Design Principles and Practical Applications

Add to Reading List

Source URL: www.schneier.com

Download Document from Source Website

File Size: 306,78 KB

Share Document on Facebook

Similar Documents

Pseudorandom Number Generators for Cryptographic Applications Diplomarbeit zur Erlangung des Magistergrades an der Naturwissenschaftlichen Fakult¨at der Paris-Lodron-Universit¨at Salzburg Andrea R¨ock

DocID: 1tghr - View Document

Computing / Software / Cryptography / Pseudorandom number generators / Computing platforms / Cross-platform software / Random number generation / Cryptographic software / /dev/random / Key generation / Entropy / Java

Motivations PRNG Security Model Java SecureRandom Analysis

DocID: 1rmDv - View Document

Cryptography / Random number generation / Randomness / Pseudorandom number generators / Information theory / Hardware random number generator / /dev/random / Entropy / Key / Pseudorandomness / Random seed / Statistical randomness

Network Working Group Request for Comments: 4086 BCP: 106 Obsoletes: 1750 Category: Best Current Practice

DocID: 1qWaS - View Document

Cryptography / Stream ciphers / Pseudorandom number generators / Solitaire / Keystream / Playing card

The Somewhat Simplified Solitaire Encryption Algorithm Overview: In Neal Stephenson’s novel Cryptonomicon, two of the main characters are able to covertly communicate with one another with a deck of playing cards (incl

DocID: 1qAir - View Document

Cryptography / Pseudorandom number generators / Stream ciphers / Feedback with Carry Shift Registers / Shrinking generator / Self-shrinking generator / Linear-feedback shift register / P-adic number / VEST

Microsoft Word - IBSS&K Engineering.doc

DocID: 1qpK0 - View Document