메뉴 건너뛰기




Volumn 2332, Issue , 2002, Pages 368-383

A practice-oriented treatment of pseudorandom number generators

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NUMBER THEORY;

EID: 84947295950     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46035-7_24     Document Type: Conference Paper
Times cited : (27)

References (35)
  • 1
    • 12444293717 scopus 로고    scopus 로고
    • Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
    • M. Abdalla and M. Bellare, “Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques,” ASIACRYPT 2000.
    • (2000) ASIACRYPT
    • Abdalla, M.1    Bellare, M.2
  • 2
    • 84947220682 scopus 로고    scopus 로고
    • High-Speed Pseudorandom Number Generation with Small Memory
    • W. Aiello, S. Rajagopalan, and R. Venkatsan, “High-Speed Pseudorandom Number Generation with Small Memory,” FSE 1999.
    • (1999) FSE
    • Aiello, W.1    Rajagopalan, S.2    Venkatsan, R.3
  • 3
    • 84947246440 scopus 로고    scopus 로고
    • American National Standard for Financial Institution KeyManagemen t (Wholesale)
    • ANSI X9.17 (Revised)
    • ANSI X9.17 (Revised), “American National Standard for Financial Institution KeyManagemen t (Wholesale),” America Bankers Association, 1985.
    • (1985) America Bankers Association
  • 4
    • 84947246440 scopus 로고    scopus 로고
    • American National Standard for Financial Institution KeyManagement (Wholesale)
    • ANSI X9.31
    • ANSI X9.31, “American National Standard for Financial Institution KeyManagement (Wholesale),” America Bankers Association, 2001.
    • (2001) America Bankers Association
  • 5
    • 24944506988 scopus 로고    scopus 로고
    • “PreliminaryAnaly sis of the BSAFE 3.X Pseudorandom Number Generators
    • Bulletin No. 8
    • R. Baldwin, “PreliminaryAnaly sis of the BSAFE 3.x Pseudorandom Number Generators,” RSA Laboratories’ Bulletin No. 8, 1998.
    • (1998) RSA Laboratories’
    • Baldwin, R.1
  • 6
    • 0002757750 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • M. Bellare, R. Canetti and H. Krawczyk, “Keying Hash Functions for Message Authentication,” CRYPTO 1996.
    • (1996) CRYPTO
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security
    • M. Bellare, R Canetti and H Krawczyk, “Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security,” FOCS 1996.
    • (1996) FOCS
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 8
    • 0031351741 scopus 로고    scopus 로고
    • A Concrete Security Treatment of Symmetric Encryption
    • M. Bellare, A. Desai, E. Jokipii and P. Rogaway, “A Concrete Security Treatment of Symmetric Encryption,” FOCS 1997.
    • (1997) FOCS
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 9
    • 84945327416 scopus 로고
    • “XOR MACs: New Methods for Message Authentication using Finite Pseudorandom Functions
    • M. Bellare, R. Guerin, and P. Rogaway, “XOR MACs: New Methods for Message Authentication using Finite Pseudorandom Functions,” CRYPTO 1995.
    • (1995) CRYPTO
    • Bellare, M.1    Guerin, R.2    Rogaway, P.3
  • 10
    • 0003372190 scopus 로고
    • The Securityof the Cipher Block Chaining Message Authentication Code
    • M. Bellare, J. Kilian and P. Rogaway, “The Securityof the Cipher Block Chaining Message Authentication Code,” CRYPTO 1994.
    • (1994) CRYPTO
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 11
    • 85016043072 scopus 로고    scopus 로고
    • Luby-Rackoff Backwards: Increasing Securityb ymaking Block Ciphers Non-Invertible
    • M. Bellare, T. Krovetz, and P. Rogaway, “Luby-Rackoff Backwards: Increasing Securityb ymaking Block Ciphers Non-Invertible,” EUROCRYPT 1998.
    • (1998) EUROCRYPT
    • Bellare, M.1    Krovetz, T.2    Rogaway, P.3
  • 12
    • 18844420431 scopus 로고    scopus 로고
    • Forward Securityin Private-KeyCry ptography
    • Report 2001/035
    • M. Bellare and B. Yee, “Forward Securityin Private-KeyCry ptography,” Cryptology ePrint Archive, Report 2001/035.
    • Cryptology Eprint Archive
    • Bellare, M.1    Yee, B.2
  • 13
    • 84947290357 scopus 로고    scopus 로고
    • Lucent Technologies Press Release
    • D. Bleichenbacher, Lucent Technologies Press Release, http://www.lucent.com/press/0201/010205.bla.html.
    • Bleichenbacher, D.1
  • 14
    • 0022716288 scopus 로고
    • A Simple Unpredictable Pseudorandom Number Generator
    • L. Blum, M. Blum, and M. Shub, “A Simple Unpredictable Pseudorandom Number Generator.” SIAM J. Computing, 15(2), 1986.
    • (1986) SIAM J. Computing , vol.15 , Issue.2
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 15
    • 0021522644 scopus 로고
    • “How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
    • M. Blum and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudorandom Bits.” SIAM J. Computing, 13, 1984.
    • (1984) SIAM J. Computing , pp. 13
    • Blum, M.1    Micali, S.2
  • 18
    • 0001010820 scopus 로고
    • Collisions for the Compression Function of MD5
    • B. Den Boer and A. Bosselaers, “Collisions for the Compression Function of MD5,” CRYPTO 1993.
    • (1993) CRYPTO
    • Den Boer, B.1    Bosselaers, A.2
  • 20
    • 84947239511 scopus 로고    scopus 로고
    • Allen, “The TLS Protocol Version 1.0,” RFC 2246
    • T. Dierks, and C. Allen, “The TLS Protocol Version 1.0,” RFC 2246, Internet Request for Comments, 1999.
    • (1999) Internet Request for Comments
    • Dierks, T.1
  • 21
    • 0001849866 scopus 로고    scopus 로고
    • The Status of MD5 After a Recent Attack, RSA Labs’
    • H. Dobbertin, “The Status of MD5 After a Recent Attack,” RSA Labs’ CryptoBytes, Vol.2 No.2, 1996.
    • (1996) Cryptobytes , vol.2 , Issue.2
    • Dobbertin, H.1
  • 22
    • 0003508562 scopus 로고
    • FIPS PUB 186-2, National Institute of Standards and Technologies
    • FIPS PUB 186-2, “Digital Signature Standard,” National Institute of Standards and Technologies, 1994.
    • (1994) Digital Signature Standard
  • 23
    • 0003508564 scopus 로고    scopus 로고
    • FIPS PUB 186-2 (Change Notice 1, National Institute of Standards and Technologies
    • FIPS PUB 186-2 (Change Notice 1), “Digital Signature Standard,” National Institute of Standards and Technologies, 2001.
    • (2001) Digital Signature Standard,”
  • 26
    • 85084160278 scopus 로고    scopus 로고
    • Software Generation of PracticallyStrong Random Numbers
    • P. Gutmann, “Software Generation of PracticallyStrong Random Numbers,” USENIX SecuritySy mposium 1998.
    • (1998) USENIX Securitysy Mposium
    • Gutmann, P.1
  • 28
    • 0038126046 scopus 로고    scopus 로고
    • Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
    • J. Kelsey, B. Schneier, and N. Ferguson, “Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator,” SAC 1999.
    • (1999) SAC
    • Kelsey, J.1    Schneier, B.2    Ferguson, N.3
  • 29
    • 33745007262 scopus 로고    scopus 로고
    • Cryptanalytic Attacks on Pseudorandom Number Generators
    • J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Cryptanalytic Attacks on Pseudorandom Number Generators,” FSE 1998.
    • (1998) FSE
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3    Hall, C.4
  • 32
    • 84957808673 scopus 로고
    • Parallel Collision Search with Applications to Hash Functions and Discrete Logarithms
    • P. Van Oorschot and M. Wiener “Parallel Collision Search with Applications to Hash Functions and Discrete Logarithms,” ACM CCS 1994.
    • (1994) ACM CCS
    • Van Oorschot, P.1    Wiener, M.2
  • 34
    • 0020301290 scopus 로고
    • Theoryand Applications of Trapdoor Functions
    • A.C. Yao, “Theoryand Applications of Trapdoor Functions,” FOCS 1982.
    • (1982) FOCS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.