An analysis of OpenSSL's random number generator
From MaRDI portal
Publication:2820501
Recommendations
- How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs
- How to eat your entropy and have it too -- optimal recovery strategies for compromised RNGs
- Cryptanalytic attacks on pseudorandom number generators
- Seedless fruit is the sweetest: random number generation, revisited
- A provable-security analysis of Intel's secure key RNG
Cited in
(3)
This page was built for publication: An analysis of OpenSSL's random number generator
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820501)