Pseudorandomness

Results: 273



#Item
91Pseudorandomness / Search algorithms / Hashing / Computational complexity theory / Pseudorandom function family / Pseudorandom generator / Hash function / Cuckoo hashing / One-way function / Cryptography / Theoretical computer science / Mathematics

Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 16:10:17
92Analysis of algorithms / Randomness / Advantage / Randomized algorithm / Adversary model / Pseudorandomness / Transmission Control Protocol / Randomness extractor / Random number generation / Cryptography / Theoretical computer science / Applied mathematics

Authenticated Key Exchange under Bad Randomness? Guomin Yang1 , Shanshan Duan2 , Duncan S. Wong3 , Chik How Tan1 , and Huaxiong Wang4 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-18 22:21:28
93CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
94Statistics / Randomness tests / Diehard tests / Random number generation / Pseudorandom number generator / Wald–Wolfowitz runs test / Pseudorandomness / Random sequence / Entropy / Randomness / Cryptography / Probability and statistics

REDEFINING RANDOMNESS QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE RANDOMNESS TEST REPORT

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
95Cryptography / Pseudorandomness / Information theory / Pseudorandom number generators / Random number generation / Pseudorandom generator / Entropy / Extractor / Randomness extractor / Theoretical computer science / Applied mathematics / Randomness

Exploiting Poor Randomness Nadia Heninger University of Pennsylvania October 13, 2014

Add to Reading List

Source URL: attackschool.di.uminho.pt

Language: English - Date: 2014-11-03 05:59:17
96Key management / /dev/random / Unix / Random number generation / Cryptographic hash function / Entropy / Padding / Pseudorandomness / Fortuna / Cryptography / Randomness / Pseudorandom number generators

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
97Randomness / Malware / Ransomware / PGPCoder / Pseudorandomness / Random seed / Applied mathematics / Deniable encryption / Random number generation / Cryptography / Cryptovirology / Cyberwarfare

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
98Theoretical computer science / Estimation theory / Extractor / Pseudorandomness / Expectation–maximization algorithm / Statistics / Applied mathematics / Mathematics

Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources Xin Luna Dong, Evgeniy Gabrilovich, Kevin Murphy, Van Dang Wilko Horn, Camillo Lugaresi, Shaohua Sun, Wei Zhang Google Inc.

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-02-12 20:45:50
99Probability and statistics / Cellular automaton / Random number generation / Statistical randomness / Pseudorandomness / Automata theory / Pseudorandom number generator / Chaos theory / Complexity / Randomness / Applied mathematics / Mathematics

Origins of Randomness in Physical Systems 1985 Randomness and chaos in physical systems are usually ultimately attributed to external noise. But it is argued here that even without such random input, the intrinsic behavi

Add to Reading List

Source URL: www.stephenwolfram.com

Language: English - Date: 2013-09-24 11:02:12
100Random number generation / Hardware random number generator / Pseudorandomness / Statistical randomness / Pseudorandom number generator / One-time pad / Random sequence / Fortuna / Entropy / Randomness / Cryptography / Applied mathematics

Table of contents Summary .............................................................................................................................................. 3 Applications of random numbers..................

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
UPDATE