Reducing Costs in HSM-Based Data Centers
暂无分享,去创建一个
[1] Stathis Mavrovouniotis,et al. Hardware Security Modules , 2014, Secure Smart Embedded Devices, Platforms and Applications.
[2] S. K. Park,et al. Random number generators: good ones are hard to find , 1988, CACM.
[3] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[4] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[5] Yehuda Lindell,et al. Introduction to Modern Cryptography, Second Edition , 2014 .
[6] Jean Everson Martina,et al. Audit and backup procedures for hardware security modules , 2008, IDtrust '08.
[7] Flaminia L. Luccio,et al. Secure Upgrade of Hardware Security Modules in Bank Networks , 2010, ARSPA-WITS.
[8] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[9] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..