Notice of Removal: New pseudorandom number generators from block ciphers

作者: Ping Zhang , Honggang Hu , Xianjun Hu , Xiaolong Yang

DOI: 10.1109/ISEASP.2017.7976982

关键词:

摘要:

参考文章(22)
Alexandra Boldyreva, Virendra Kumar, A New Pseudorandom Generator from Collision-Resistant Hash Functions Lecture Notes in Computer Science. pp. 187- 202 ,(2012) , 10.1007/978-3-642-27954-6_12
Yu Yu, Xiangxue Li, Jian Weng, Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters international conference on the theory and application of cryptology and information security. pp. 261- 279 ,(2013) , 10.1007/978-3-642-42045-0_14
Thomas Shrimpton, R. Seth Terashima, A Provable-Security Analysis of Intel’s Secure Key RNG theory and application of cryptographic techniques. pp. 77- 100 ,(2015) , 10.1007/978-3-662-46800-5_4
Anand Desai, Alejandro Hevia, Yiqun Lisa Yin, A Practice-Oriented Treatment of Pseudorandom Number Generators international cryptology conference. pp. 368- 383 ,(2002) , 10.1007/3-540-46035-7_24
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Henri Gilbert, The Security of ”One-Block-to-Many” Modes of Operation Fast Software Encryption. pp. 376- 395 ,(2003) , 10.1007/978-3-540-39887-5_27
Jean-Bernard Fischer, Jacques Stern, An efficient pseudo-random generator provably as secure as syndrome decoding theory and application of cryptographic techniques. pp. 245- 255 ,(1996) , 10.1007/3-540-68339-9_22
Lequan Min, Kexin Hu, Lijiao Zhang, Yuqun Zhang, Study on Pseudorandomness of Some Pseudorandom Number Generators with Application computational intelligence and security. pp. 569- 574 ,(2013) , 10.1109/CIS.2013.126
M. Bellare, A. Boldyreva, L. Knudsen, C. Namprempre, On-line Ciphers and the Hash-CBC Constructions Journal of Cryptology. ,vol. 25, pp. 640- 679 ,(2012) , 10.1007/S00145-011-9106-1