An analysis of OpenSSL's random number generator
From MaRDI portal
Publication:2820501
DOI10.1007/978-3-662-49890-3_25zbMATH Open1385.94074OpenAlexW2461407378MaRDI QIDQ2820501FDOQ2820501
Authors: Falko Strenzke
Publication date: 9 September 2016
Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49890-3_25
Recommendations
- How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs
- How to eat your entropy and have it too -- optimal recovery strategies for compromised RNGs
- Cryptanalytic attacks on pseudorandom number generators
- Seedless fruit is the sweetest: random number generation, revisited
- A provable-security analysis of Intel's secure key RNG
Cited In (3)
This page was built for publication: An analysis of OpenSSL's random number generator
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820501)