搜索结果: 1-15 共查到“军队指挥学 Number Generator”相关记录15条 . 查询时间(0.016 秒)
In this work we demonstrate various weaknesses of the random
number generator (RNG) in the OpenSSL cryptographic library. We
show how OpenSSL’s RNG, knowingly in a low entropy state, potentially
le...
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
PRNG Lightweight Warbler
2015/12/24
Pseudorandom number generators (PRNGs) are very important for EPC Class 1 Generation 2 (EPC C1 G2) Radio Frequency Identification (RFID) systems. A PRNG is able to provide a 16-bit random number that ...
VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
stream cipher distinguishing attack
2014/3/6
We present a new Cryptographically Secure Pseudo-Random Number Generator. It uses permutations as its internal state, similarly to the RC4 stream cipher. We describe a statistical test which revealed ...
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves
Pseudorandom numbers Subset sum problem Knapsack Exponential sums
2011/2/23
Given a prime $p$, an elliptic curve $\mathcal{E}/\mathbb{F}_p$ over the finite field $\mathbb{F}_p$ of $p$ elements and a binary linear recurrence sequence $\(u(n)\)_{n =1}^\infty$ of order~$r$, we s...
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves
Number Generator elliptic curve
2012/3/29
Given a prime $p$, an elliptic curve $\mathcal{E}/\mathbb{F}_p$ over the finite field $\mathbb{F}_p$ of $p$ elements and a binary linear recurrence sequence $\(u(n)\)_{n =1}^\infty$ of order~$r$, we s...
A Random Number Generator Based on Isogenies Operations
Random Number Generator Public-key Cryptosystem Quantum Computer Isogeny Elliptic Curve
2010/3/16
A random number generator based on the operation of isogenies between elliptic curves
over finite fields Fp is proposed. By using the proposed generator together with the isogeny
cryptography algori...
SPICE Simulation of a “Provably Secure”True Random Number Generator
Random number generation provable security SPICE simulation
2009/6/9
In their paper “A Provably Secure True Random Number
Generator with Built-in Tolerance to Active Attacks”, B. Sunar, W. Martin,
and D. Stinson propose a design for a true random number generator.
U...
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
Theoretical cryptanalysis Klimov-Shamir number generator TF-1
2009/2/19
The internal state of the Klimov-Shamir number generator
TF-1 consists of four words of size w bits each, whereas its
intended strength is 22w. We exploit an asymmetry in its output
function to sho...
Simple Pseudorandom Number Generator with Strengthened Double Encryption(Cilia)
Pseudorandom Number Generator Block Cipher Hash Function Pseudorandom Function
2009/1/21
A new cryptographic pseudorandom number generator Cilia
is presented. It hashes real random data using an iterative hash function
to update its secret state, and it generates pseudorandom numbers
u...
A d-Sequence based Recursive Random Number Generator
d-Sequence Recursive Random Number Generator
2008/12/17
Binary d-sequences were investigated for their cryptographic properties by Subhash Kak in [1,2], who also examined their application to watermarking [3], and made a proposal for their use as random nu...
Analysis of the Linux Random Number Generator Zvi Gutterman
Linux random number generator zvi gutterman
2008/11/4
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entropy of operating system...
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Random Number Generation Elliptic Curve Cryptography
2008/9/16
An elliptic curve random number generator (ECRNG) has been approved in a NIST standards
and proposed for ANSI and SECG draft standards. This paper proves that, if three
conjectures are true, then th...
Bingo Voting: Secure and coercion-free voting using a trusted random number generator
secure electronic voting coercion-free receipt-free
2008/9/1
It is debatable if current direct-recording electronic voting
machines can sufficiently be trusted for a use in elections. Reports about
malfunctions and possible ways of manipulation abound. Voting...
A Pollard-like pseudorandom number generator over EC
random number generation elliptic curve cryptography Pollard’s rho algorithm
2008/8/14
In this short paper we propose a pseudorandom number generator over EC based on Pollardlike
method. In contrast to the well known Elliptic Curve Random Number Generator (see e.g.
ANSI and NIST draft...
Cryptanalysis of the Random Number Generator of the Windows Operating System
Cryptanalysis Random Number Generator Windows Operating System
2008/5/22
The pseudo-random number generator (PRNG) used by the Windows operating system is
the most commonly used PRNG. The pseudo-randomness of the output of this generator is
crucial for the security of al...