Generating quasi-random sequences from semi-random sources
Journal of Computer and System Sciences
An LSI random number generator (RNG)
Proceedings of CRYPTO 84 on Advances in cryptology
Parallel collision search with application to hash functions and discrete logarithms
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
The official PGP user's guide
Cryptographic Randomness from Air Turbulence in Disk Drives
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Random sources for cryptographic systems
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
A Practice-Oriented Treatment of Pseudorandom Number Generators
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Re-dividing Complexity between Algorithms and Keys
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Information Security Applications
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
Fast pseudorandom generator based on packed matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
An architecture-independent instruction shuffler to protect against side-channel attacks
ACM Transactions on Architecture and Code Optimization (TACO) - HIPEAC Papers
Privacy-preserving reconstruction of multidimensional data maps in vehicular participatory sensing
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
A study of entropy sources in cloud computers: random number generation on cloud hosts
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Randomly failed! the state of randomness in current java implementations
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Security analysis of pseudo-random number generators with input: /dev/random is not robust
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values assumed to be random. We argue that PRNGs are their own unique type of cryptographic primitive, and should be analyzed as such. We propose a model for PRNGs, discuss possible attacks against this model, and demonstrate the applicability of the model (and our attacks) to four real-world PRNGs. We close with a discussion of lessons learned about PRNG design and use, and a few open questions.