<--- Back to Details
First PageDocument Content
Pseudorandom number generators / Information theory / State functions / Hardware random number generator / FIPS 140 / Random number generation / Entropy / Key generation / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Cryptography standards
Date: 2012-12-06 12:46:33
Pseudorandom number generators
Information theory
State functions
Hardware random number generator
FIPS 140
Random number generation
Entropy
Key generation
Cryptographically secure pseudorandom number generator
Cryptography
Randomness
Cryptography standards

Testing SP 800-90B Entropy Sources

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 75,10 KB

Share Document on Facebook

Similar Documents

Pseudorandom Number Generators for Cryptographic Applications Diplomarbeit zur Erlangung des Magistergrades an der Naturwissenschaftlichen Fakult¨at der Paris-Lodron-Universit¨at Salzburg Andrea R¨ock

DocID: 1tghr - View Document

Computing / Software / Cryptography / Pseudorandom number generators / Computing platforms / Cross-platform software / Random number generation / Cryptographic software / /dev/random / Key generation / Entropy / Java

Motivations PRNG Security Model Java SecureRandom Analysis

DocID: 1rmDv - View Document

Cryptography / Random number generation / Randomness / Pseudorandom number generators / Information theory / Hardware random number generator / /dev/random / Entropy / Key / Pseudorandomness / Random seed / Statistical randomness

Network Working Group Request for Comments: 4086 BCP: 106 Obsoletes: 1750 Category: Best Current Practice

DocID: 1qWaS - View Document

Cryptography / Stream ciphers / Pseudorandom number generators / Solitaire / Keystream / Playing card

The Somewhat Simplified Solitaire Encryption Algorithm Overview: In Neal Stephenson’s novel Cryptonomicon, two of the main characters are able to covertly communicate with one another with a deck of playing cards (incl

DocID: 1qAir - View Document

Cryptography / Pseudorandom number generators / Stream ciphers / Feedback with Carry Shift Registers / Shrinking generator / Self-shrinking generator / Linear-feedback shift register / P-adic number / VEST

Microsoft Word - IBSS&K Engineering.doc

DocID: 1qpK0 - View Document