Recommendation for Random Number Generation Using Deterministic Random Bit Generators

This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions, block cipher algorithms or number theoretic problems.

[1]  Elaine B. Barker Recommendation for Key Management - Part 1 General , 2014 .

[2]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[3]  Elaine B. Barker,et al.  Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .

[4]  Quynh H. Dang,et al.  Recommendation for Applications Using Approved Hash Algorithms , 2009 .

[5]  Matthew J. Campagna Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator , 2006, IACR Cryptol. ePrint Arch..

[6]  John Kelsey,et al.  Recommendation for Random Bit Generator (RBG) Constructions , 2016 .

[7]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[8]  John Kelsey,et al.  Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition , 2012 .

[9]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[10]  Elaine B. Barker,et al.  Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2007 .

[11]  Geo. J. Manson Success , 1898, The American journal of dental science.

[12]  Nicolas Gürel Extracting bits from coordinates of a point of an elliptic curve , 2005, IACR Cryptol. ePrint Arch..

[13]  Igor E. Shparlinski,et al.  On the Uniformity of Distribution of Congruential Generators over Elliptic Curves , 2001, SETA.

[14]  A. Swinburne,et al.  Return , 1888, The Hospital.