-
3
-
-
84947984296
-
Proper Initialization for the BSAFE Random Number Generator
-
R.W. Baldwin, “Proper Initialization for the BSAFE Random Number Generator," RSA Laboratories Bulletin, n. 3, 25 Jan 1996.
-
(1996)
RSA Laboratories Bulletin
, vol.3
, pp. 25
-
-
Baldwin, R.W.1
-
4
-
-
0003402107
-
-
January
-
M. Blaze, W. Difie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener, “Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security," January 1996.
-
(1996)
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security
-
-
Blaze, M.1
Difie, W.2
Rivest, R.3
Schneier, B.4
Shimomura, T.5
Thompson, E.6
Wiener, M.7
-
5
-
-
84944129139
-
-
Crypto++ library
-
W. Dai, Crypto++ library, http://www.eskimo.com/~weidai/cryptlib.html.
-
-
-
Dai, W.1
-
6
-
-
40849109815
-
Cryptographic Randomness from Air Turbulience in Disk Drives
-
Springer-Verlag
-
D. Davis, R. Ihaka, and P. Fenstermacher, “Cryptographic Randomness from Air Turbulience in Disk Drives," Advances in Cryptology— CRYPTO '94 Proceedings, Springer-Verlag, 1994, pp. 114-120.
-
(1994)
Advances in Cryptology— CRYPTO '94 Proceedings
, pp. 114-120
-
-
Davis, D.1
Ihaka, R.2
Fenstermacher, P.3
-
7
-
-
49749098034
-
Randomness Requirements for Security
-
D. Eastlake, S.D. Crocker, and J.I. Schiller, “Randomness Requirements for Security," RFC 1750, Internet Engineering Task Force, Dec. 1994.
-
(1994)
RFC 1750, Internet Engineering Task Force
-
-
Eastlake, D.1
Crocker, S.D.2
Schiller, J.I.3
-
8
-
-
84873721230
-
An LSI Random Number Generator (RNG)
-
Springer-Verlag
-
R.C. Fairchild, R.L. Mortenson, and K.B. Koulthart, “An LSI Random Number Generator (RNG)," Advances in Cryptology: Proceedings of CRYPTO '84, Springer-Verlag, 1985, pp. 203-230.
-
(1985)
Advances in Cryptology: Proceedings of CRYPTO '84
, pp. 203-230
-
-
Fairchild, R.C.1
Mortenson, R.L.2
Koulthart, K.B.3
-
9
-
-
0022100543
-
Concept for a High-Performance Random Number Generator Based on Physical Random Noise
-
M. Gude, “Concept for a High-Performance Random Number Generator Based on Physical Random Noise," Frequenz, v. 39, 1985, pp. 187-190.
-
(1985)
Frequenz
, vol.39
, pp. 187-190
-
-
Gude, M.1
-
10
-
-
14844356835
-
Software Generation of Random Numbers for Cryptographic Purposes
-
USENIX Association
-
P. Gutmann, “Software Generation of Random Numbers for Cryptographic Purposes," Proceedings of the 1998 Usenix Security Symposium, USENIX Association, 1998, pp. 243-257.
-
(1998)
Proceedings of the 1998 Usenix Security Symposium
, pp. 243-257
-
-
Gutmann, P.1
-
12
-
-
84944129141
-
-
post to , sci.crypt Internet newsgroup (message-ID pckDIr4Ar.L4z@netcom.com), 4 Dec
-
P. Kocher, post to sci.crypt Internet newsgroup (message-ID pckDIr4Ar.L4z@netcom.com), 4 Dec 1995.
-
(1995)
-
-
Kocher, P.1
-
13
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Springer-Verlag
-
P. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology—CRYPTO '96 Proceedings, Springer-Verlag, 1996, pp. 104-113.
-
(1996)
Advances in Cryptology—Crypto '96 ProCeedings
, pp. 104-113
-
-
Kocher, P.1
-
15
-
-
84947910726
-
Cryptanalytic Attacks on Pseudorandom Number Generators
-
Springer-Verlag
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Cryptanalytic Attacks on Pseudorandom Number Generators," Fast Software Encryption, 5th International Workshop Proceedings, Springer-Verlag, 1998, pp. 168-188.
-
(1998)
Fast Software Encryption, 5Th InterNational Workshop Proceedings
, pp. 168-188
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
16
-
-
84958769993
-
Side Channel Cryptanalysis of Product Ciphers
-
Springer-Verlag
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Side Channel Cryptanalysis of Product Ciphers," ESORICS '98 Proceedings, Springer-Verlag, 1998, pp. pp 97-110.
-
(1998)
ESORICS '98 Proceedings
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
17
-
-
0342830668
-
“CryptoLib: Cryptography in Software
-
USENIX Association
-
J.B. Lacy, D.P. Mitchell, and W.M. Schell, “CryptoLib: Cryptography in Software," USENIX Security Symposium IV Proceedings, USENIX Association, 1993, pp. 237-246.
-
(1993)
USENIX Security Symposium IV Proceedings
, pp. 237-246
-
-
Lacy, J.B.1
Mitchell, D.P.2
Schell, W.M.3
-
19
-
-
84944129143
-
-
National Institute of Standards and Technology. DES Modes of Operation, December 2, FIPS available from
-
National Institute of Standards and Technology. DES Modes of Operation, December 2, 1980. FIPS available from http://www.itl.nist.gov/div897/pubs/fip81.htm.
-
(1980)
-
-
-
20
-
-
84944129144
-
-
National Institute of Standards and Technology. Data Encryption Standard (DES), December 30, FIPS PUB 46-2, available from
-
National Institute of Standards and Technology. Data Encryption Standard (DES), December 30, FIPS PUB 46-2, available from http://www.itl.nist.gov/div897/pubs/fip46-2.htm.
-
-
-
-
21
-
-
84944129145
-
-
National Institute of Standards and Technology. Secure Hash Standard, April 17, FIPS PUB 180-1, available from
-
National Institute of Standards and Technology. Secure Hash Standard, April 17, 1995. FIPS PUB 180-1, available from http://www.itl.nist.gov/div897/pubs/fip180-1.htm.
-
(1995)
-
-
-
22
-
-
0003508568
-
-
NIS99. National Institute of Standards and Technology, DRAFT FIPS PUB
-
NIS99. National Institute of Standards and Technology. Data Encryption Standard (DES), 1999. DRAFT FIPS PUB 46-3.
-
(1999)
Data Encryption Standard (DES
, pp. 46-53
-
-
-
23
-
-
84944051480
-
-
National Institute for Standards and Technology, NIST FIPS PUB 171, U.S. Department of Commerce
-
National Institute for Standards and Technology, “Key Management Using NIST FIPS PUB 171, U.S. Department of Commerce, 1992.
-
(1992)
Key Management Using
-
-
-
24
-
-
5644274855
-
“Truly Random Numbers
-
Nov
-
C. Plumb, “Truly Random Numbers, Dr. Dobbs Journal, v. 19, n. 13, Nov 1994, pp. 113-115.
-
(1994)
Dobbs Journal
, vol.19
, Issue.13
, pp. 113-115
-
-
Plumb, C.1
-
26
-
-
84944129146
-
-
RSA Laboratories, RSAREF cryptographic library, Mar
-
RSA Laboratories, RSAREF cryptographic library, Mar 1994, ftp://ftp.funet.fi/pub/crypt/cryptography/asymmetric/rsa/rsaref2.tar.gz
-
(1994)
-
-
-
27
-
-
0021469810
-
Generating Quasi-Random Sequences from Slightly Random Sources
-
M. Santha and U.V. Vazirani, “Generating Quasi-Random Sequences from Slightly Random Sources," Journal of Computer and System Sciences, v. 33, 1986, pp. 75-87.
-
(1986)
Journal of Computer and System Sciences
, vol.33
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
|