Eastlake 3rd et al., 1994 - Google Patents
Randomness recommendations for securityEastlake 3rd et al., 1994
View HTML- Document ID
- 16284298538786175811
- Author
- Eastlake 3rd D
- Crocker S
- Schiller J
- Publication year
External Links
Snippet
RFC 1750: Randomness Recommendations for Security [RFC Home] [TEXT|PDF|HTML] [Tracker]
[IPR] [Info page] Obsoleted by: 4086 INFORMATIONAL Network Working Group D. Eastlake,
3rd Request for Comments: 1750 DEC Category: Informational S. Crocker Cybercash J. Schiller …
- 238000000034 method 0 description 48
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Eastlake 3rd et al. | Randomness recommendations for security | |
| Eastlake 3rd et al. | RFC1750: Randomness recommendations for security | |
| Eastlake 3rd et al. | Randomness requirements for security | |
| Mushtaq et al. | A survey on the cryptographic encryption algorithms | |
| AU729638B2 (en) | A non-deterministic public key encryption system | |
| Denning | Cryptography and data security | |
| Robshaw | Stream ciphers | |
| Jun et al. | The Intel random number generator | |
| Kocarev et al. | Pseudorandom bits generated by chaotic maps | |
| US5541996A (en) | Apparatus and method for a pseudo-random number generator for high precision numbers | |
| Röck | Pseudorandom number generators for cryptographic applications | |
| Orumiehchiha et al. | Cryptanalysis of RC4 (n, m) Stream Cipher | |
| Jueneman | A high speed manipulation detection code | |
| Eastlake 3rd et al. | Rfc 4086: randomness requirements for security | |
| Maximov | Some words on cryptanalysis of stream ciphers | |
| Zhu et al. | Efficient construction of provably secure steganography under ordinary covert channels | |
| Younes et al. | CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-TimeMultimedia Transmission. | |
| JP3557037B2 (en) | Random number generation device and method, key sequence generation device and method, encryption device and method, and decryption device and method | |
| Schiller | Network Working Group D. Eastlake, 3rd Request for Comments: 1750 DEC Category: Informational S. Crocker Cybercash | |
| Abhishek | On random number generation for kernel applications | |
| Teh et al. | A stream cipher based on spatiotemporal chaos and true random synchronization | |
| Crocker | Status of This Document This dacument is intended to become a Best Current Practice. Comments should be sent to the authors. Distribution is unlimited. This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC 2026. Internet-Drafts are | |
| Nita et al. | Pseudorandom Number Generators | |
| Neacșu | The Effectiveness of the Statistical Testing of Randomness in a Complete Cryptographic System | |
| Rahouma | Reviewing and applying security services with non-english letter coding to secure software applications in light of software trade-offs |