Recommendation for Random Number Generation Using Deterministic Random Bit Generators
暂无分享,去创建一个
[1] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[2] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[3] Elaine B. Barker,et al. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[4] Quynh H. Dang,et al. Recommendation for Applications Using Approved Hash Algorithms , 2009 .
[5] Matthew J. Campagna. Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator , 2006, IACR Cryptol. ePrint Arch..
[6] John Kelsey,et al. Recommendation for Random Bit Generator (RBG) Constructions , 2016 .
[7] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[8] John Kelsey,et al. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition , 2012 .
[9] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[10] Elaine B. Barker,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2007 .
[11] Geo. J. Manson. Success , 1898, The American journal of dental science.
[12] Nicolas Gürel. Extracting bits from coordinates of a point of an elliptic curve , 2005, IACR Cryptol. ePrint Arch..
[13] Igor E. Shparlinski,et al. On the Uniformity of Distribution of Congruential Generators over Elliptic Curves , 2001, SETA.
[14] A. Swinburne,et al. Return , 1888, The Hospital.