-
2
-
-
84947984295
-
-
ANSI X 9.17 (Revised), “American National Standard for Financial Institution Key Management (Wholesale)," American Bankers Association
-
ANSI85. ANSI X 9.17 (Revised), “American National Standard for Financial Institution Key Management (Wholesale)," American Bankers Association, 1985.
-
(1985)
-
-
-
3
-
-
84947984296
-
Proper Initialization for the BSAFE Random Number Generator
-
25 Jan 1996
-
R.W. Baldwin, “Proper Initialization for the BSAFE Random Number Generator," RSA Laboratories Bulletin, n. 3, 25 Jan 1996.
-
RSA Laboratories Bulletin
, Issue.3
-
-
Baldwin, R.W.1
-
5
-
-
40849109815
-
Cryptographic Randomness from Air Turbulience in Disk Drives
-
DIF94. D. Davis, R. Ihaka, and P. Fenstermacher, “Cryptographic Randomness from Air Turbulience in Disk Drives," Advances in Cryptology | CRYPTO '94 Proceedings, Springer-Verlag, 1994, pp. 114-120.
-
(1994)
Advances in Cryptology | CRYPTO '94 Proceedings, Springer-Verlag
, pp. 114-120
-
-
Davis, D.1
Ihaka, R.2
Fenstermacher, P.3
-
6
-
-
49749098034
-
Randomness Requirements for Security
-
Internet Engineering Task Force, Dec
-
ECS94. D. Eastlake, S.D. Crocker, and J.I. Schiller, “Randomness Requirements for Security," RFC 1750, Internet Engineering Task Force, Dec. 1994.
-
(1994)
RFC 1750
-
-
Eastlake, D.1
Crocker, S.D.2
Schiller, J.I.3
-
7
-
-
84873721230
-
An LSI Random Number Generator (RNG)
-
Springer-Verlag
-
FMK85. R.C. Fairchild, R.L. Mortenson, and K.B. Koulthart, “An LSI Random Number Generator (RNG)," Advances in Cryptology: Proceedings of CRYPTO '84, Springer-Verlag, 1985, pp. 203-230.
-
(1985)
Advances in Cryptology: Proceedings of CRYPTO '84
, pp. 203-230
-
-
Fairchild, R.C.1
Mortenson, R.L.2
Koulthart, K.B.3
-
8
-
-
0022100543
-
Concept for a High-Performance Random Number Generator Based on Physical Random Noise
-
M. Gude, “Concept for a High-Performance Random Number Generator Based on Physical Random Noise," Frequenz, v. 39, 1985, pp. 187-190.
-
(1985)
Frequenz
, vol.39
, pp. 187-190
-
-
Gude, M.1
-
11
-
-
0342830668
-
“CryptoLib: Cryptography in Software
-
USENIX Association
-
LMS93. J.B. Lacy, D.P. Mitchell, and W.M. Schell, “CryptoLib: Cryptography in Software," USENIX Security Symposium IV Proceedings, USENIX Association, 1993, pp. 237-246.
-
(1993)
USENIX Security Symposium IV Proceedings
, pp. 237-246
-
-
Lacy, J.B.1
Mitchell, D.P.2
Schell, W.M.3
-
12
-
-
84947984297
-
-
National Institute for Standards and Technology, “Key Management Using X9.17," NIST FIPS PUB 171, U.S. Department of Commerce, 1992
-
NIST92. National Institute for Standards and Technology, “Key Management Using X9.17," NIST FIPS PUB 171, U.S. Department of Commerce, 1992.
-
-
-
-
13
-
-
84947984298
-
-
National Institute for Standards and Technology, “Secure Hash Standard," NIST FIPS PUB 180, U.S. Department of Commerce
-
National Institute for Standards and Technology, “Secure Hash Standard," NIST FIPS PUB 180, U.S. Department of Commerce, 1993.
-
(1993)
-
-
-
14
-
-
84947984299
-
-
National Institute for Standards and Technology, “Digital Signature Standard," NIST FIPS PUB 186, U.S. Department of Commerce
-
NIST94. National Institute for Standards and Technology, “Digital Signature Standard," NIST FIPS PUB 186, U.S. Department of Commerce, 1994.
-
(1994)
-
-
-
15
-
-
84957808673
-
“Parallel collision search with application to hash function and discrete logarithms
-
New York, NY, ACM
-
OW95. P.C. van Oorschot and M.J. Wiener, “Parallel collision search with application to hash function and discrete logarithms," 2nd ACM Conf. On Computer and Communications Security, New York, NY, ACM, 1994.
-
(1994)
2Nd ACM Conf. On Computer and Communications Security
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
16
-
-
21344445451
-
“Improving implementable meetin-the-middle attacks by orders of magnitude
-
Springer-Verlag
-
OW96. P.C. van Oorschot and M.J. Wiener, “Improving implementable meetin-the-middle attacks by orders of magnitude," CRYPTO '96, Springer-Verlag, 1996.
-
(1996)
CRYPTO '96
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
17
-
-
5644274855
-
Truly Random Numbers, Dr
-
C. Plumb, “Truly Random Numbers, Dr. Dobbs Journal, v. 19, n. 13, Nov 1994, pp. 113-115.
-
(1994)
Dobbs Journal
, vol.19
, Issue.13
, pp. 113-115
-
-
Plumb, C.1
-
19
-
-
84947984301
-
-
RSA Laboratories, RSAREF cryptographic library, Mar 1994
-
RSA Laboratories, RSAREF cryptographic library, Mar 1994, ftp://ftp.funet.fi/pub/crypt/cryptography/asymmetric/rsa/rsaref2.tar.gz.
-
-
-
-
20
-
-
0021469810
-
Generating Quasi-Random Sequences from Slightly Random Sources
-
SV86. M. Santha and U.V. Vazirani, “Generating Quasi-Random Sequences from Slightly Random Sources," Journal of Computer and System Sciences, v. 33, 1986, pp. 75-87.
-
(1986)
Journal of Computer and System Sciences
, vol.33
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
|