Pseudorandomness

Results: 273



#Item
181Hashing / Pseudorandomness / Key derivation function / Cryptographic hash function / Pseudorandom function family / Key / HMAC / Randomness extractor / Symmetric-key algorithm / Cryptography / Key management / Message authentication codes

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
182Applied mathematics / Screw extractor / HTML element / Mathematics / Science / Extractor / Pseudorandomness / Theoretical computer science

Package ‘boilerpipeR’ August 21, 2014 Version[removed]Date[removed]Title Interface to the boilerpipe Java library by Christian Kohlschutter (http://code.google.com/p/boilerpipe/)

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-08-21 00:42:25
183Theoretical computer science / Screw extractor / WordPress / Extraction / Software / Extractor / Pseudorandomness

Short Introduction to boilerpipeR Mario Annau [removed] August 20, 2014 Abstract This vignette gives a short introduction to boilerpipeR, a package which interfaces the boilerpipe Java

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-08-21 00:42:25
184Random number generation / Hardware random number generator / /dev/random / Pseudorandom number generator / Entropy / Pseudorandomness / Pseudo-ring / Random sequence / Information theory / Randomness / Cryptography / Applied mathematics

Comments Received on DRAFT ANS X9.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:15:12
185Applied mathematics / Pseudorandom number generator / Hardware random number generator / Entropy / Pseudorandomness / Cryptography / Randomness / State functions

ANSI X9.82, Part 3 3 Deterministic Random Bit Generators (DRBGs)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:14:40
186Block cipher / Key generation / Symmetric-key algorithm / Random number generation / Pseudorandomness / Key / Public-key cryptography / Cryptographically secure pseudorandom number generator / Cryptography standards / Cryptography / Key management / Randomness

Why Random Numbers for Cryptography? Miles Smid Orion Security Solutions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:04:24
187Cryptography / Applied mathematics / Modular arithmetic / Information theory / Random number generation / Pseudorandomness / Pseudorandom number generator / CRYPTREC / Luhn algorithm / Error detection and correction / Randomness / Mathematics

Report on Present State of TAO TIME Evaluation (screening evaluation) January 28, 2002 Kazuo Takaragi, Member Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
188Information theory / Random number generation / Randomness / Synthetic data / Generator / Pseudorandomness / Null / Hash function / Table / Computing / Information / Data management

PDF Document

Add to Reading List

Source URL: dbtest2013.soe.ucsc.edu

Language: English - Date: 2013-06-24 10:19:02
189Ute / Keccak / NIST hash function competition / Cryptographic hash functions

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:39:22
190K1 / Tiny Encryption Algorithm / Block cipher / NIST hash function competition / Hash function / Merkle–Damgård construction / N-Hash / Cryptography / Cryptographic hash functions / Keccak

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:25:42
UPDATE