Pseudorandom generator

Results: 304



#Item
131Pseudorandomness / Computational complexity theory / Randomness / Randomness extractor / Pseudorandom generator / Extractor / Leftover hash lemma / Information theory / Entropy / Theoretical computer science / Applied mathematics / Mathematics

Randomness in Cryptography April 6, 2013 Lecture 12: Computational Key Derivation Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:30
132Computational complexity theory / Randomness extractor / Information theory / Finite fields / Leftover hash lemma / Entropy / XTR / Pseudorandom generator / Cryptographic hash function / Cryptography / Applied mathematics / Randomness

Overcoming Weak Expectations Yevgeniy Dodis∗ Yu Yu† December 22, 2012

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2012-12-22 10:21:59
133RC4 / Distinguishing attack / Py / Permutation / Weak key / Related-key attack / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-03-18 09:06:03
134Pseudorandomness / Randomness / Algorithmic information theory / Pseudorandom generator / Complexity classes / Bounded-error probabilistic polynomial / Randomized algorithm / Randomness extractor / PP / Theoretical computer science / Applied mathematics / Computational complexity theory

Pseudorandom Generators, Typically-Correct Derandomization, and Circuit Lower Bounds∗ Jeff Kinne †

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2009-07-13 09:37:01
135Circuit complexity / Boolean circuit / Polynomial / Circuit / Pseudorandom generator / Electronic circuit / Theoretical computer science / Applied mathematics / Computational complexity theory

Tentative talk schedule ======================= The regular sessions are from[removed]till[removed]and from[removed]till[removed]There is a cake at 15:00. Wednesday afternoon is reserved for a hike. The program ends Friday at n

Add to Reading List

Source URL: www.dagstuhl.de

Language: English - Date: 2014-03-18 08:35:48
136Pseudorandom number generators / Cryptography / Binary arithmetic / Linear feedback shift register / Knapsack problem / Theoretical computer science / Applied mathematics / Mathematics

Cryptanalysis of the Knapsack Generator

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-02-14 15:21:20
137Information theory / Pseudorandomness / Random number generation / Hardware random number generator / National Security Agency / Cryptographic hash function / Entropy / Block cipher / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

NIST Special Publication[removed]Recommendation for Random Number Generation Using Deterministic Random Bit Generators Elaine Barker

Add to Reading List

Source URL: web.archive.org

Language: English
138Abstract algebra / Quadratic polynomial / Irreducible polynomial / Finite field / Pseudorandom generator / Pseudorandom generators for polynomials / Degree of a polynomial / Polynomials / Mathematics / Algebra

Pseudorandom bits for polynomials Andrej Bogdanov∗ Emanuele Viola† August 10, 2007

Add to Reading List

Source URL: projectamericano.com

Language: English - Date: 2007-08-10 18:35:00
139Pseudorandom number generators / Key / National Institute of Standards and Technology / CRYPTREC / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

NIST removes cryptography algorithm from random number generator recommendations

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-02-26 04:25:01
140Pseudo-ring / Mathematics / Pseudorandom number generators / Randomness / Information theory / Random number generation

Random Number Generator Certificate Operator: Gaussian Networks Pvt Ltd Operator URL: www.adda52.com This is to certify that iTech Labs has evaluated the Random Number Generator (RNG) used by Gaussian

Add to Reading List

Source URL: www.itechlabs.com.au

Language: English - Date: 2014-01-26 04:07:50
UPDATE