Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

An analysis of OpenSSL's random number generator

From MaRDI portal
Publication:2820501
Jump to:navigation, search

DOI10.1007/978-3-662-49890-3_25zbMATH Open1385.94074OpenAlexW2461407378MaRDI QIDQ2820501FDOQ2820501


Authors: Falko Strenzke Edit this on Wikidata


Publication date: 9 September 2016

Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49890-3_25




Recommendations

  • How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs
  • How to eat your entropy and have it too -- optimal recovery strategies for compromised RNGs
  • Cryptanalytic attacks on pseudorandom number generators
  • Seedless fruit is the sweetest: random number generation, revisited
  • A provable-security analysis of Intel's secure key RNG


Mathematics Subject Classification ID

Random number generation in numerical analysis (65C10) Cryptography (94A60)



Cited In (3)

  • An intermediate secret-guessing attack on hash-based signatures
  • How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs
  • How to eat your entropy and have it too -- optimal recovery strategies for compromised RNGs





This page was built for publication: An analysis of OpenSSL's random number generator

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820501)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2820501&oldid=15738633"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 3 February 2024, at 18:23. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki