<--- Back to Details
First PageDocument Content
Pseudorandom number generators / Cryptography / Pseudorandomness / Randomness / Information theory / Random number generation / Dual EC DRBG / Fortuna / Pseudorandom generator / RdRand / RSA Security / PRGS
Date: 2016-06-03 14:14:07
Pseudorandom number generators
Cryptography
Pseudorandomness
Randomness
Information theory
Random number generation
Dual EC DRBG
Fortuna
Pseudorandom generator
RdRand
RSA Security
PRGS

The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. Pat

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 843,20 KB

Share Document on Facebook

Similar Documents

For Release ECI® Announces LightSEC™ Cyber Security Solution for Smart Grid - Protects Utilities from Current and Future Cyber Security Threats ECI will be showcasing its LightSEC solution at RSA 2016 in San Francisco

For Release ECI® Announces LightSEC™ Cyber Security Solution for Smart Grid - Protects Utilities from Current and Future Cyber Security Threats ECI will be showcasing its LightSEC solution at RSA 2016 in San Francisco

DocID: 1uB3a - View Document

On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada

On the Security of Multi-prime RSA M. Jason Hinek David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada

DocID: 1tovj - View Document

SECURITY INNOVATION  N TR U Q UAN TUM-SAFE , S T AN DA R DIZ ED C R Y PTO Quantum computing will immediately break the most commonly used asymmetric crypto solutions in the market today – RSA and ECC. Quantum-proof cry

SECURITY INNOVATION N TR U Q UAN TUM-SAFE , S T AN DA R DIZ ED C R Y PTO Quantum computing will immediately break the most commonly used asymmetric crypto solutions in the market today – RSA and ECC. Quantum-proof cry

DocID: 1tcOk - View Document

An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure Noboru Kunihiro The University of Tokyo, Japan  November 24th, 2015

An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure Noboru Kunihiro The University of Tokyo, Japan November 24th, 2015

DocID: 1sln6 - View Document

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document