搜索结果: 1-8 共查到“军队指挥学 PRNG”相关记录8条 . 查询时间(0.05 秒)
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
blockchain distributed cryptography public-key cryptography
2019/4/10
Blockchain technology has immense potential. At the same time, it is not always possible to scale blockchains. State Channels solve the problem of scalability while increasing the blockchain's speed a...
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
jit spaying attacks flash player prng constant blinding
2019/1/29
Constant blinding is an efficient countermeasure against just-in-time (JIT) spraying attacks. Unfortunately, this mitigation mechanism is not always implemented correctly. One such example is the cons...
The polynomials defining the LFSRs of the linux Kernel PRNG are irreducible but not primitive. As a result, the space of numbers generated by these LFSRs does not fill all the space. We propose in thi...
A Robust and Sponge-Like PRNG with Improved Efficiency
sponge pseudo-random number generator (PRNG) Patarin's H-coefficient technique
2016/12/9
Ever since Keccak won the SHA3 competition, sponge-based
constructions are being suggested for many different applications, including
pseudo-random number generators (PRNGs). Sponges are very
desir...
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
RFID EPC-C1-G2 Authentication
2015/12/31
Recently,Wang et al. analyzed the security of two EPC C1-G2 compliant RFID authentication
protocols, called RAPLT and SRP +, and proved that these protocols are vulnerable
against de-synchronization...
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
RFID Mutual Authentication
2014/3/11
In this paper we present new constraints to EPCglobal Class 1 Generation 2 (EPC-C1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead t...
The generation of high quality random numbers is crucial to many cryptographic applications, including cryptographic protocols, secret of keys, nonces or salts. Their values must contain enough random...
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
Block Cipher PRNG Side-Channel Key Recovery
2008/5/28
We study the security of a block cipher-based pseudorandom
number generator, both in the black box world and in the physical world,
separately. We first show that the construction is a secure PRNG ...