How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs
Algorithmica, Volume 79, Issue 4, 2017, Pages 1196-1232.
Random number generatorRNGState compromise
Random number generators (RNGs) play a crucial role in many cryptographic schemes and protocols, but their security proof usually assumes that their internal state is initialized with truly random seeds and remains secret at all times. However, in many practical situations these are unrealistic assumptions: The seed is often gathered afte...More
PPT (Upload PPT)