Tags: rng*

5 bookmark(s) - Sort by: Date ↓ / Title /

  1. NIST Special Publication 800-90. Recommendation for Random Number Generation Using Deterministic Random Bit Generators.
    Tags: , , , by Andreas Turtschan (2007-11-16)
  2. Cryptanalytic Attacks on Pseudorandom Number Generators. J. Kelsey, B. Schneier, D. Wagner, and C. Hall.
    Tags: , , , by Andreas Turtschan (2007-11-16)
  3. Analysis of the Linux Random Number Generator. Zvi Gutterman, Benny Pinkas, Tzachy Reinman.
    Tags: , , , , by Andreas Turtschan (2007-11-16)
  4. bruce schneier about a security flaw (backdoor) in nsa's random-number generator dual_ec_drbg.
    Tags: , , , , , by Andreas Turtschan (2007-11-16)
  5. Dorrendorf, Gutterman and Pinkas have reverse engineered the random number generator code from Windows. According to their paper, it is easy (O(1)) to compute a previous random number and possible (O(2^23) to predict the next one. (via The Inquirer)

Top of the page

First / Previous / Next / Last / Page 1 of 1 Bookmarks: tagged with "rng"

About - Propulsed by SemanticScuttle