Author:
Brown Daniel R. L.,Gjøsteen Kristian
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing 13, 850–864 (1984)
2. Lecture Notes in Computer Science;B.S. Kaliski,1987
3. Barker, E., Kelsey, J.: Recommendation for Random Number Generation Using Deterministic Random Bit Generators. National Institute of Standards and Technology (2006), http://csrc.nist.gov/CryptoToolkit/RNG/SP800-90_June2006.pdf
4. Johnson, D.B.: X9.82 part 3 number theoretic DRBGs. Presentation at NIST RNG Workshop (2004), http://csrc.nist.gov/CryptoToolkit/RNG/Workshop/NumberTheoreticDRBG.pdf
5. Barker, E.: ANSI X9.82: Part 3 —2006, Random Number Generation, Part 3: Deterministic Random Bit Generators. American National Standards Institute (2006), Draft. http://www.x9.org/
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Governance Landscape;Information Technology and Law Series;2024-09-01
2. Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
3. Subversion-Resilient Authenticated Encryption Without Random Oracles;Applied Cryptography and Network Security;2023
4. Attacks on SSL and TLS;Guide to Internet Cryptography;2022
5. On Pseudo-random Number Generation Using Elliptic Curve Cryptography;Communications in Computer and Information Science;2013