Key generator

Results: 91



#Item
51Random number generators for cryptography – design, evaluation and tests Viktor Fischer Hubert Curien Laboratory, Jean Monnet University Saint-Etienne, France Random numbers are crucial in cryptography: they are used a

Random number generators for cryptography – design, evaluation and tests Viktor Fischer Hubert Curien Laboratory, Jean Monnet University Saint-Etienne, France Random numbers are crucial in cryptography: they are used a

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-06-17 09:40:30
52Notice Hewlett-Packard to Agilent Technologies Transition This documentation supports a product that previously shipped under the HewlettPackard company brand name. The brand name has now been changed to Agilent Technolo

Notice Hewlett-Packard to Agilent Technologies Transition This documentation supports a product that previously shipped under the HewlettPackard company brand name. The brand name has now been changed to Agilent Technolo

Add to Reading List

Source URL: www.naic.edu

Language: English - Date: 2012-09-10 11:24:00
53Testing SP 800-90B Entropy Sources

Testing SP 800-90B Entropy Sources

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 12:46:33
54Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner  ???

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
55First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
56The Key Agreement Schemes

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
57First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
58NIST-Recommended Random Number Generator Based on ANSI X9.31 Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms January 31, 2005

NIST-Recommended Random Number Generator Based on ANSI X9.31 Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms January 31, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
59Why Random Numbers for Cryptography? Miles Smid Orion Security Solutions

Why Random Numbers for Cryptography? Miles Smid Orion Security Solutions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:04:24
60CRYPTREC / Cryptographic hash functions / Differential cryptanalysis / NESSIE / Cryptanalysis / Alternating step generator / Data Encryption Standard / Cryptosystem / Symmetric-key algorithm / Cryptography / Stream ciphers / Block ciphers

RTF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45