Tags: security* + paper* + rng*

3 bookmark(s) - Sort by: Date ↓ / Title /

  1. Cryptanalytic Attacks on Pseudorandom Number Generators. J. Kelsey, B. Schneier, D. Wagner, and C. Hall.
    Tags: , , , by Andreas Turtschan (2007-11-16)
  2. Analysis of the Linux Random Number Generator. Zvi Gutterman, Benny Pinkas, Tzachy Reinman.
    Tags: , , , , by Andreas Turtschan (2007-11-16)
  3. Dorrendorf, Gutterman and Pinkas have reverse engineered the random number generator code from Windows. According to their paper, it is easy (O(1)) to compute a previous random number and possible (O(2^23) to predict the next one. (via The Inquirer)

Top of the page

First / Previous / Next / Last / Page 1 of 1 Bookmarks: tagged with "security+paper+rng"

About - Propulsed by SemanticScuttle