Pseudorandom generator

Results: 304



#Item
161Probability and statistics / Pseudorandom number generators / Diehard tests / Random number generation / George Marsaglia / Hardware random number generator / Multiply-with-carry / Normal distribution / Generator / Randomness / Cryptography / Statistics

New URL: http://www.R-project.org/conferences/DSC[removed]DSC 2001 Proceedings of the 2nd International Workshop on Distributed Statistical Computing March 15-17, Vienna, Austria http://www.ci.tuwien.ac.at/Conferences/DSC

Add to Reading List

Source URL: www.r-project.org

Language: English - Date: 2014-02-10 03:17:56
162Pseudorandom number generators / Information theory / State functions / Hardware random number generator / FIPS 140 / Random number generation / Entropy / Key generation / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Cryptography standards

Testing SP 800-90B Entropy Sources

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 12:46:33
163Algorithm / Mathematical logic / Theoretical computer science / Validation / Pseudorandom number generator / Verification and validation / Science / Logic / Philosophy of science / Pharmaceutical industry / Validity / Systems engineering

Sharon Keller  To provide assurance that the algorithm has been

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 09:32:21
164Information theory / Thermodynamic entropy / Probability and statistics / State functions / Entropy / Hardware random number generator / Random number generation / Randomness / Cryptography / Pseudorandom number generators

Random Bit Generator Constructions Elaine Barker NIST December 5, 2012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 14:30:38
165Binary arithmetic / Cryptographically secure pseudorandom number generator / Parity bit / RSA / Boolean algebra / FO / XTR / Blum Blum Shub / Blum–Goldwasser cryptosystem / Cryptography / Pseudorandom number generators / Electronic commerce

--- Efficient and Secure Pseudo-Random Number Generation. (Extended Abstract) Umesh V. Vazirani *

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2005-06-09 20:48:30
166Applied mathematics / Probability and statistics / Pseudorandom number generators / Entropy / Statistical theory / Hardware random number generator / Random number generation / /dev/random / Min-entropy / Randomness / Cryptography / Information theory

RBG Workshop (December[removed]Entropy Sources and You: An Overview of SP 800-90B

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-06 09:35:31
167Fortuna / Entropy / Random number generation / Stream cipher / Cryptographic hash function / Hash function / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Key generation

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
168Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
169Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
170Pseudorandomness / Randomness / Computational complexity theory / Pseudorandom generator theorem / Pseudorandom generator / Random number generation / Random seed / Random permutation / One-way function / Cryptography / Theoretical computer science / Applied mathematics

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:25:01
UPDATE