How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs
暂无分享,去创建一个
Adi Shamir | Yevgeniy Dodis | Daniel Wichs | Noah Stephens-Davidowitz | A. Shamir | Daniel Wichs | Noah Stephens-Davidowitz | Y. Dodis
[1] Elaine B. Barker,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2007 .
[2] Benny Pinkas,et al. Cryptanalysis of the random number generator of the Windows operating system , 2009, TSEC.
[3] Frederic P. Miller,et al. /Dev/Random , 2010 .
[4] Arjen K. Lenstra,et al. Public Keys , 2012, CRYPTO.
[5] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[6] Igor E. Shparlinski,et al. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces , 2002, Journal of Cryptology.
[7] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[8] PinkasBenny,et al. Cryptanalysis of the random number generator of the Windows operating system , 2009 .
[9] Shai Halevi,et al. A model and architecture for pseudo-random generation with applications to /dev/random , 2005, CCS '05.
[10] N. S. Barnett,et al. Private communication , 1969 .
[11] Bruce Schneier,et al. Practical cryptography , 2003 .
[12] SahaiAmit,et al. A complete problem for statistical zero knowledge , 2003 .
[13] Adi Shamir,et al. How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs , 2014, CRYPTO.
[14] Donald E. Eastlake,et al. Randomness Requirements for Security , 2005, RFC.
[15] Patrick Lacharme,et al. The Linux Pseudorandom Number Generator Revisited , 2012, IACR Cryptol. ePrint Arch..
[16] Benny Pinkas,et al. Analysis of the Linux random number generator , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[17] Bruce Schneier,et al. Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator , 1999, Selected Areas in Cryptography.
[18] David Pointcheval,et al. Security analysis of pseudo-random number generators with input: /dev/random is not robust , 2013, CCS.
[19] Moni Naor,et al. Fast Software Encryption , 2002, Lecture Notes in Computer Science.
[20] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[21] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.
[22] Werner Schindler,et al. Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications , 2002, CHES.