How to Eat Your Entropy and Have It Too – Optimal Recovery Strategies for Compromised RNGs
From MaRDI portal
Publication:2874529
DOI10.1007/978-3-662-44381-1_3zbMath1334.94073OpenAlexW124127463MaRDI QIDQ2874529
Daniel Wichs, Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz
Publication date: 7 August 2014
Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-44381-1_3
Related Items (6)
A brief and understandable guide to pseudo-random number generators and specific models for security ⋮ A robust and sponge-like PRNG with improved efficiency ⋮ Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks ⋮ A Mathematical Framework for Exact Milestoning ⋮ Extracting randomness from extractor-dependent sources ⋮ Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
This page was built for publication: How to Eat Your Entropy and Have It Too – Optimal Recovery Strategies for Compromised RNGs