Author:
Farashahi Reza Rezaeian,Schoenmakers Berry,Sidorenko Andrey
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Barker, E., Kelsey, J.: Recommendation for random number generation using deterministic random bit generators. NIST Special Publication (SP) 800-90 (December 2005)
2. Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing 13(4), 850–864 (1984)
3. Brown, D.: Conjectured security of the ANSI-NIST Elliptic Curve RNG. Cryptology ePrint Archive, Report 2006 /117 (2006),
http://eprint.iacr.org/
4. Lecture Notes in Computer Science;O. Chevassut,2006
5. Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 167–226 (2003)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献