Pseudorandomness

Results: 273



#Item
81Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2013-12-16 07:37:43
82Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Algorithmic information theory / Pseudorandom generator / Hard-core predicate / XTR / One-way function / Naor-Reingold Pseudorandom Function / Theoretical computer science / Cryptography / Applied mathematics

An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-27 12:28:51
83Information theory / Fortuna / Key management / Entropy / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptographic hash function / Key / Cryptography / Pseudorandom number generators / Randomness

Cryptography Engineering: Design Principles and Practical Applications

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-07 19:29:27
84Applied mathematics / Algorithmic information theory / Pseudorandom generator / Computational complexity theory / Pseudorandom function family / One-way function / Advantage / Negligible function / Function / Cryptography / Theoretical computer science / Pseudorandomness

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-10-31 17:44:37
85Analog circuits / Electrical components / Control flow / Resistor / NI Multisim / Python / Variable / Capacitor / Pseudorandomness / Electronic engineering / Electronics / Software engineering

DOC Document

Add to Reading List

Source URL: www2.mvcc.edu

Language: English - Date: 2015-05-05 16:43:16
86Hardware random number generator / Random number generation / Id Quantique / Pseudorandom number generator / Pseudorandomness / Randomness / Cryptography / Computer peripherals

USER CASE REDEFINING RANDOMNESS Loterie Romande Quantum Draws for Lottery Games in Switzerland Quantis True Random Number Generator in Lottery Application

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
87Randomness / Pseudorandomness / Computational complexity theory / Information theory / Randomness extractor / Extractor / Pseudorandom generator / Min-entropy / Screw extractor / Theoretical computer science / Applied mathematics / Mathematics

Computational Extractors and Pseudorandomness Dana Dachman-Soled ∗ Rosario Gennaro†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-28 18:41:58
88Randomness / Block cipher / Cryptography / Pseudorandomness

STREAM CIPHERS and PRGs Stateful Generators Initially, St is a random seed

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-21 12:18:18
89MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
90One-way function / Pseudorandom generator theorem / Hard-core predicate / Random oracle / Verifiable random function / Trapdoor function / Pseudorandom function family / Pseudorandom generator / Pseudorandom permutation / Cryptography / Pseudorandomness / Cryptographic hash functions

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
UPDATE