Pseudorandom number generator

Results: 243



#Item
151Hardware random number generator / Random number generation / American National Standards Institute / Entropy / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Randomness

The Strategy Behind the Proposed Random Number Generation Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:08:30
152Random number generation / SHA-2 / Cryptographic hash function / Digital Signature Algorithm / Hash function / Octet / Random password generator / Cryptography / Randomness / Pseudorandom number generators

FIPS[removed]Change Notice[removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 12:26:58
153Thermodynamic entropy / Thermodynamics / Probability and statistics / Pseudorandom number generators / Philosophy of thermal and statistical physics / Entropy / Hardware random number generator / Min-entropy / Randomness / Cryptography / Information theory

Entropy and Entropy Sources in X9.82 John Kelsey, NIST, July 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:05:00
154Stream cipher / Cryptographic hash function / Pseudorandom number generator / Symmetric-key algorithm / Block cipher / Crypt / Cipher / Outline of cryptography / Cryptographically secure pseudorandom number generator / Cryptography / CRYPTREC / MUGI

Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee (Science University of Tokyo)

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
155Information theory / Key management / Fortuna / Entropy / Random number generation / Key generation / Key / Advanced Encryption Standard / Min-entropy / Cryptography / Pseudorandom number generators / Randomness

ANALYSIS OF INTEL’S IVY BRIDGE DIGITAL RANDOM NUMBER GENERATOR PREPARED FOR INTEL BY Mike Hamburg

Add to Reading List

Source URL: www.cryptography.com

Language: English - Date: 2012-06-12 13:35:05
156Stream cipher / Cryptographic hash function / Pseudorandom number generator / Block cipher / Symmetric-key algorithm / Cipher / Key size / Outline of cryptography / Index of cryptography articles / Cryptography / CRYPTREC / MUGI

Report on FY2001 Evaluation of Symmetric-Key Cryptographic Techniques April 16, 2002 Toshinobu Kaneko Chair, Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
157Cryptography / Applied mathematics / Modular arithmetic / Information theory / Random number generation / Pseudorandomness / Pseudorandom number generator / CRYPTREC / Luhn algorithm / Error detection and correction / Randomness / Mathematics

Report on Present State of TAO TIME Evaluation (screening evaluation) January 28, 2002 Kazuo Takaragi, Member Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
158Information theory / Fortuna / Key generation / Random number generation / Entropy / Niels Ferguson / One-time pad / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographi Pseudorandom Number Generator John Kelsey, Bru e S hneier, and Niels Ferguson Counterpane Systems; 101 E Minnehaha Parkway, Minneapolis, MN 55419,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
159Pseudorandom number generators / Information theory / Entropy / Random number generation / Key / Cryptographically secure pseudorandom number generator / Fortuna / Cryptography / Randomness / Thermodynamic entropy

PDF Document

Add to Reading List

Source URL: www.apache-ssl.org

Language: English - Date: 2009-01-02 13:32:33
160Pseudorandomness / Computational hardness assumptions / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Naor-Reingold Pseudorandom Function / Decisional Diffie–Hellman assumption / Pseudorandom function family / Randomized algorithm / Cryptography / Theoretical computer science / Applied mathematics

Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-16 13:57:22
UPDATE