메뉴 건너뛰기




Volumn , Issue , 2005, Pages 203-212

A model and architecture for pseudo-random generation and applications to /dev/random

Author keywords

Dev random; Entropy; Mixing functions; Pseudorandomness; Smart cards; True randomness

Indexed keywords

DEV/RANDOM; MIXING FUNCTIONS; PSEUDORANDOMNESS; TRUE RANDOMNESS;

EID: 33745781447     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102148     Document Type: Conference Paper
Times cited : (80)

References (14)
  • 3
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Nov.. Preliminary version in FOCS '82
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4):850-864, Nov. 1984. Preliminary version in FOCS '82.
    • (1984) SIAM J. Comput. , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 4
    • 84984842401 scopus 로고
    • Maintaining security in the presence of transient faults
    • LNCS No. 839
    • R. Canetti and A. Herzberg. Maintaining security in the presence of transient faults. In Crypto '94, pages 425-438, 1994. LNCS No. 839.
    • (1994) Crypto '94 , pp. 425-438
    • Canetti, R.1    Herzberg, A.2
  • 5
    • 35048839833 scopus 로고    scopus 로고
    • Randomness extraction and key derivation using the CBC, Cascade and HMAC modes
    • LNCS No. 3152
    • Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin. Randomness extraction and key derivation using the CBC, Cascade and HMAC modes. In Crypto '04, pages 494-510, 2004. LNCS No. 3152
    • (2004) Crypto '04 , pp. 494-510
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 6
    • 24144460521 scopus 로고    scopus 로고
    • Entropic security and the encryption of high entropy messages
    • Y. Dodis and A. Smith. Entropic security and the encryption of high entropy messages. In Theory of Cryptography Conference (TCC) '05, pages 556-577, 2005.
    • (2005) Theory of Cryptography Conference (TCC) '05 , pp. 556-577
    • Dodis, Y.1    Smith, A.2
  • 8
    • 0029755067 scopus 로고    scopus 로고
    • Randomness and the Netscape browser
    • I. Goldberg and D. Wagner. Randomness and the Netscape browser. Dr. Dobb's Journal, pages 66-70, 1996.
    • (1996) Dr. Dobb's Journal , pp. 66-70
    • Goldberg, I.1    Wagner, D.2
  • 9
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • ACM
    • O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In Proc. 21st STOC, pages 25-32. ACM, 1989.
    • (1989) Proc. 21st STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 10
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • ACM, 25-27 May
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proc. 19th STOC, pages 218-229. ACM, 25-27 May 1987.
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 11
    • 85084160278 scopus 로고    scopus 로고
    • Software generation of practically strong random numbers
    • P. Gutmann. Software generation of practically strong random numbers. In Proceedings of the 7th USENIX Security Symposium, 1998. Available from http://www.cs.auckland.ac.nz/~pgut001/.
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Gutmann, P.1
  • 12
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • Preliminary versions appeared in STOC' 89 and STOC' 90
    • J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999. Preliminary versions appeared in STOC' 89 and STOC' 90.
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 13
    • 84947910726 scopus 로고    scopus 로고
    • Cryptanalytic attacks on pseudorandom number generators
    • LNCS No. 1372
    • J. Kelsey, B. Schneier, D. Wagner, and C. Hall. Cryptanalytic attacks on pseudorandom number generators. In FSE '98, pages 168-188, 1998. LNCS No. 1372.
    • (1998) FSE '98 , pp. 168-188
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3    Hall, C.4
  • 14
    • 33749012868 scopus 로고    scopus 로고
    • Recent developments in extractors
    • G. Paun, R. I. Virgili, G. Rozenberg, and A. Salomaa, editors. World Scientific, 2004. Preliminary version in bulletin of the EATCS
    • R. Shaltiel. Recent developments in extractors. In G. Paun, R. I. Virgili, G. Rozenberg, and A. Salomaa, editors, Current trends in theoretical computer science., volume 1. World Scientific, 2004. Preliminary version in bulletin of the EATCS, 2002. Available on http://www.cs.haifa.ac.il/~ronen/.
    • (2002) Current Trends in Theoretical Computer Science , vol.1
    • Shaltiel, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.