<--- Back to Details
First PageDocument Content
Information theory / Key management / Linear congruential generator / Random number generation / Random number generator attack / Entropy / Randomizer / One-time pad / Pseudorandomness / Cryptography / Randomness / Pseudorandom number generators
Date: 2003-12-11 08:24:36
Information theory
Key management
Linear congruential generator
Random number generation
Random number generator attack
Entropy
Randomizer
One-time pad
Pseudorandomness
Cryptography
Randomness
Pseudorandom number generators

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Download Document from Source Website

File Size: 128,85 KB

Share Document on Facebook

Similar Documents

Raspberry Pi Secure messaging Cryptography: One Time Pad Nate Drake explains how your Pi can bring you to the very pinnacle of

DocID: 1tKJw - View Document

Public-key cryptography / Cryptography / Key management / Blind signature / Electronic voting / Financial cryptography / Digital signature / Blinding / RSA / Key / Cryptographic protocol / One-time pad

United States Patent] Chaum

DocID: 1pC5J - View Document

Cryptography / Applied mathematics / Key management / Cipher / Cryptanalysis / Block cipher / One-time pad / Data Encryption Standard / Key / Index of cryptography articles / Book:Cryptography

Modern Cryptography M. Edwards Recap Evolution of Cryptography

DocID: 1oTfL - View Document

Security / Prevention / Computer access control / Identity documents / Access control / Cybercrime / Identity management / Password / Mobile security / Authentication / Transaction authentication number / Computer security

Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz Ruhr-University Bochum, Germany, {firstname.lastname}@rub.de

DocID: 1l5Fn - View Document

Cryptography / One-time pad / Quantum information science

Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

DocID: 1fW06 - View Document