Pages that link to "Item:Q4639448"
From MaRDI portal
The following pages link to Cryptanalytic Attacks on Pseudorandom Number Generators (Q4639448):
Displaying 11 items.
- How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs (Q1688404) (← links)
- Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices (Q1718927) (← links)
- Cryptographic pseudorandom generators can make cryptosystems problematic (Q2061967) (← links)
- A brief and understandable guide to pseudo-random number generators and specific models for security (Q2137825) (← links)
- Secure sealed-bid online auctions using discreet cryptographic proofs (Q2450498) (← links)
- Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs (Q2876934) (← links)
- Fault-injection based backdoors in Pseudo Random Number Generators (Q2973172) (← links)
- A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators (Q3098001) (← links)
- Quantum attacks on pseudorandom generators (Q4925033) (← links)
- On Random Number Generation for Kernel Applications (Q5089678) (← links)
- Attack on a Chaos-Based Random Number Generator Using Anticipating Synchronization (Q5246690) (← links)