Cryptanalytic Attacks on Pseudorandom Number Generators
From MaRDI portal
Publication:4639448
DOI10.1007/3-540-69710-1_12zbMath1385.94048OpenAlexW1564219727WikidataQ27964291 ScholiaQ27964291MaRDI QIDQ4639448
John Kelsey, David Wagner, Chris Hall, Bruce Schneier
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-69710-1_12
Related Items (6)
A brief and understandable guide to pseudo-random number generators and specific models for security ⋮ On Random Number Generation for Kernel Applications ⋮ How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs ⋮ Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices ⋮ Secure sealed-bid online auctions using discreet cryptographic proofs ⋮ Quantum attacks on pseudorandom generators
Uses Software
Cites Work
This page was built for publication: Cryptanalytic Attacks on Pseudorandom Number Generators