Seedless Fruit is the Sweetest: Random Number Generation, Revisited
暂无分享,去创建一个
Yevgeniy Dodis | Stefano Tessaro | Sandro Coretti | Harish Karthikeyan | Stefano Tessaro | Sandro Coretti | Y. Dodis | H. Karthikeyan
[1] Avi Wigderson,et al. Extracting Randomness Using Few Independent Sources , 2006, SIAM J. Comput..
[2] Stefano Tessaro,et al. Public-Seed Pseudorandom Permutations , 2017, EUROCRYPT.
[3] Mihir Bellare,et al. Improved Security Analyses for CBC MACs , 2005, CRYPTO.
[4] Moni Naor,et al. On Everlasting Security in the Hybrid Bounded Storage Model , 2006, ICALP.
[5] Dan Shumow,et al. An Analysis of NIST SP 800-90A , 2019, EUROCRYPT.
[6] Bruce Schneier,et al. Practical cryptography , 2003 .
[7] Adi Shamir,et al. How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs , 2017, Algorithmica.
[8] Ronen Shaltiel,et al. True Random Number Generators Secure in a Changing Environment , 2003, CHES.
[9] John P. Steinberger,et al. Tight Security Bounds for Key-Alternating Ciphers , 2014, EUROCRYPT.
[10] Noam Nisan,et al. More deterministic simulation in logspace , 1993, STOC.
[11] Leonid A. Levin,et al. Pseudo-random Generation from one-way functions (Extended Abstracts) , 1989, STOC 1989.
[12] Mihir Bellare,et al. Instantiating Random Oracles via UCEs , 2013, IACR Cryptol. ePrint Arch..
[13] Oded Goldreich,et al. The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) , 1985, FOCS.
[14] Oded Goldreich,et al. Unbiased bits from sources of weak randomness and probabilistic communication complexity , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[15] Bruce Schneier,et al. Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator , 1999, Selected Areas in Cryptography.
[16] Krzysztof Pietrzak,et al. The Exact PRF-Security of NMAC and HMAC , 2014, IACR Cryptol. ePrint Arch..
[17] Michael E. Saks,et al. Some extremal problems arising from discrete control processes , 1989, Comb..
[18] David Zuckerman,et al. Deterministic extractors for small-space sources , 2011, J. Comput. Syst. Sci..
[19] Shai Halevi,et al. A model and architecture for pseudo-random generation with applications to /dev/random , 2005, CCS '05.
[20] Guido Bertoni,et al. Sponge-Based Pseudo-Random Number Generators , 2010, CHES.
[21] Yevgeniy Dodis,et al. Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources , 2012, TCC.
[22] Berry Schoenmakers,et al. Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator , 2006, IACR Cryptol. ePrint Arch..
[23] John Kelsey,et al. NIST Special Publication 800-90A: Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2011 .
[24] Jacques Patarin,et al. The "Coefficients H" Technique , 2009, Selected Areas in Cryptography.
[25] David Pointcheval,et al. Security analysis of pseudo-random number generators with input: /dev/random is not robust , 2013, CCS.
[26] Oded Goldreich,et al. The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[27] Thomas Shrimpton,et al. A Provable-Security Analysis of Intel's Secure Key RNG , 2015, EUROCRYPT.
[28] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[29] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[30] Hugo Krawczyk,et al. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.
[31] Stefano Tessaro,et al. Provably Robust Sponge-Based PRNGs and KDFs , 2016, EUROCRYPT.
[32] Guido Bertoni,et al. On the Indifferentiability of the Sponge Construction , 2008, EUROCRYPT.
[33] Tanja Lange,et al. On the Practical Exploitability of Dual EC in TLS Implementations , 2014, USENIX Security Symposium.
[34] Manuel Blum. Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1986, Comb..
[35] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[36] Daniel Hutchinson. A Robust and Sponge-Like PRNG with Improved Efficiency , 2016, SAC.
[37] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[38] David Zuckerman,et al. Explicit two-source extractors and resilient functions , 2016, Electron. Colloquium Comput. Complex..
[39] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[40] Luca Trevisan,et al. Extracting randomness from samplable distributions , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.