How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs

Algorithmica, Volume 79, Issue 4, 2017, Pages 1196-1232.

Cited by: 37|Bibtex|Views52|Links
EI
Keywords:
Random number generatorRNGState compromise

Abstract:

Random number generators (RNGs) play a crucial role in many cryptographic schemes and protocols, but their security proof usually assumes that their internal state is initialized with truly random seeds and remains secret at all times. However, in many practical situations these are unrealistic assumptions: The seed is often gathered afte...More

Code:

Data:

Your rating :
0

 

Tags
Comments