-
2
-
-
85076203232
-
Openssl random pseudo bytes() painfully slow
-
Unknown Author
-
Unknown Author. openssl random pseudo bytes() painfully slow. PHP Bug # 51636, https://bugs.php.net/bug.php?id=51636, 2010.
-
(2010)
PHP Bug # 51636
-
-
-
3
-
-
26444449872
-
On stern’s attack against secret truncated linear congruential generators
-
Colin Boyd and Juan Manuel González Nieto, editors, Springer
-
Scott Contini and Igor Shparlinski. On stern’s attack against secret truncated linear congruential generators. In Colin Boyd and Juan Manuel González Nieto, editors, ACISP, volume 3574 of Lecture Notes in Computer Science, pages 52–60. Springer, 2005.
-
(2005)
ACISP, Volume 3574 of Lecture Notes in Computer Science
, pp. 52-60
-
-
Contini, S.1
Shparlinski, I.2
-
5
-
-
84910650506
-
Lesser known security problems in php applications
-
Stefan Esser. Lesser known security problems in php applications. In Zend Conference, 2008.
-
(2008)
Zend Conference
-
-
Esser, S.1
-
7
-
-
0022793132
-
How to construct random functions
-
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. J. ACM, 33(4):792–807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
8
-
-
0021975313
-
The cryptographic security of truncated linearly related variables
-
Robert Sedgewick, editor, ACM
-
Johan Håstad and Adi Shamir. The cryptographic security of truncated linearly related variables. In Robert Sedgewick, editor, STOC, pages 356–362. ACM, 1985.
-
(1985)
STOC
, pp. 356-362
-
-
Håstad, J.1
Shamir, A.2
-
9
-
-
85076201335
-
Economics of password cracking in the GPU era
-
Robert”Hackajar” Imhoff-Dousharm. Economics of password cracking in the gpu era. In DEFCON 19, 2011.
-
(2011)
DEFCON
, vol.19
-
-
Robert”Hackajar1
Imhoff-Dousharm2
-
10
-
-
84910635690
-
PHPWN: Attacking sessions and pseudo-random numbers in php
-
Las Vegas, NV 2010
-
Samy Kamkar. phpwn: Attacking sessions and pseudo-random numbers in php. In Blackhat USA, Las Vegas, NV 2010, 2010.
-
(2010)
Blackhat USA
-
-
Kamkar, S.1
-
12
-
-
84958953465
-
Segment lll-reduction of lattice bases
-
Joseph H. Silverman, editor, Springer
-
Henrik Koy and Claus-Peter Schnorr. Segment lll-reduction of lattice bases. In Joseph H. Silverman, editor, CaLC, volume 2146 of Lecture Notes in Computer Science, pages 67–80. Springer, 2001.
-
(2001)
CaLC, Volume 2146 of Lecture Notes in Computer Science
, pp. 67-80
-
-
Koy, H.1
Schnorr, C.-P.2
-
13
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A.K. Lenstra, H.W.jun. Lenstra, and Lászlo Lovász. Factoring polynomials with rational coefficients. Math. Ann., 261:515–534, 1982.
-
(1982)
Math. Ann.
, vol.261
, pp. 515-534
-
-
Lenstra, A.K.1
jun Lenstra, H.W.2
Lovász, L.3
-
14
-
-
84864273340
-
Ron was wrong, whit is right
-
2012
-
Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, and Christophe Wachter. Ron was wrong, whit is right. IACR Cryptology ePrint Archive, 2012:064, 2012.
-
(2012)
IACR Cryptology ePrint Archive
, pp. 064
-
-
Lenstra, A.K.1
Hughes, J.P.2
Augier, M.3
Bos, J.W.4
Kleinjung, T.5
Wachter, C.6
-
15
-
-
0031599142
-
Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator
-
Makoto Matsumoto and Takuji Nishimura. Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul., 8(1):3–30, 1998.
-
(1998)
ACM Trans. Model. Comput. Simul.
, vol.8
, Issue.1
, pp. 3-30
-
-
Matsumoto, M.1
Nishimura, T.2
-
16
-
-
85076224135
-
Tactical exploitation
-
HD Moore and Valsmith. Tactical exploitation. In DEFCON 15, 2007.
-
(2007)
DEFCON
, vol.15
-
-
Moore, H.D.1
Valsmith2
-
17
-
-
0023576573
-
Secret linear congruential generators are not cryptographically secure
-
IEEE Computer Society
-
Jacques Stern. Secret linear congruential generators are not cryptographically secure. In FOCS, pages 421–426. IEEE Computer Society, 1987.
-
(1987)
FOCS
, pp. 421-426
-
-
Stern, J.1
|