Security analysis of NIST CTR-DRBG
From MaRDI portal
Publication:2096485
Recommendations
Cites work
- A Pseudorandom Generator from any One-way Function
- A provable-security analysis of Intel's secure key RNG
- Advances in Cryptology – CRYPTO 2004
- Advances on Access-Driven Cache Attacks on AES
- An analysis of NIST SP 800-90A
- Improved Security Analyses for CBC MACs
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Leftover Hash Lemma, Revisited
- On recycling the randomness of states in space bounded computation
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Provably robust sponge-based PRNGs and KDFs
- Salvaging weak security bounds for blockcipher-based constructions
- Security analysis of NIST CTR-DRBG
- Seedless fruit is the sweetest: random number generation, revisited
- Sponge-based pseudo-random number generators
- The “Coefficients H” Technique
- Tight security bounds for key-alternating ciphers
- Topics in Cryptology – CT-RSA 2006
Cited in
(9)- An analysis of NIST SP 800-90A
- A forkcipher-based pseudo-random number generator
- scientific article; zbMATH DE number 1759647 (Why is no real title available?)
- Security analysis of the ISO standard \textsf{OFB}-\textsf{DRBG}
- Reinterpreting and improving the cryptanalysis of the Flash Player PRNG
- A robust and sponge-like PRNG with improved efficiency
- A provable-security analysis of Intel's secure key RNG
- Provably robust sponge-based PRNGs and KDFs
- Security analysis of NIST CTR-DRBG
This page was built for publication: Security analysis of NIST CTR-DRBG
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096485)