A Practice-Oriented Treatment of Pseudorandom Number Generators
- 29 April 2002
- book chapter
- Published by Springer Nature
- p. 368-383
- https://doi.org/10.1007/3-540-46035-7_24
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying TechniquesPublished by Springer Nature ,2000
- High-Speed Pseudorandom Number Generation with Small MemoryPublished by Springer Nature ,1999
- Cryptanalytic Attacks on Pseudorandom Number GeneratorsPublished by Springer Nature ,1998
- Luby-Rackoff backwards: Increasing security by making block ciphers non-invertiblePublished by Springer Nature ,1998
- Keying Hash Functions for Message AuthenticationPublished by Springer Nature ,1996
- XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom FunctionsPublished by Springer Nature ,1995
- How to construct random functionsJournal of the ACM, 1986
- A Simple Unpredictable Pseudo-Random Number GeneratorSIAM Journal on Computing, 1986
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982