搜索结果: 1-4 共查到“军队指挥学 RNG”相关记录4条 . 查询时间(0.063 秒)
Two-faced processes and existence of RNG with proven properties
foundations pseudo-randomness
2016/1/27
Random and pseudorandom number generators (RNG and PRNG) are
used for many purposes including cryptographic, modeling and simulation
applications. For such applications a generated bit sequence shou...
A Provable Security Analysis of Intel's Secure Key RNG
random number generator entropy extraction provable security
2016/1/8
We provide the first provable-security analysis of the Intel Secure Key hardware RNG
(ISK-RNG), versions of which have appeared in Intel processors since late 2011. To model the ISKRNG,
we generaliz...
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
applied cryptography bitcoin key management
2016/1/6
In this paper we study the question of key management and
practical operational security in bitcoin digital currency storage systems.
We study the security two most used bitcoin HD Wallet key manage...
Conjectured Security of the ANSI-NIST Elliptic Curve RNG
Random Number Generation Elliptic Curve Cryptography
2008/11/11
An elliptic curve random number generator (ECRNG) has been proposed in ANSI and NIST
draft standards. This paper proves that, if three conjectures are true, then the ECRNG is secure.The three conject...