scispace - formally typeset
Book ChapterDOI

Random Number Generators for Cryptographic Applications

Werner Schindler
- pp 5-23
Reads0
Chats0
About
The article was published on 2009-01-01. It has received 184 citations till now. The article focuses on the topics: Cryptographic primitive & Random number generator attack.

read more

Citations
More filters
Proceedings ArticleDOI

Radio-telepathy: extracting a secret key from an unauthenticated wireless channel

TL;DR: This paper presents a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space.
Journal ArticleDOI

Information-Theoretically Secret Key Generation for Fading Wireless Channels

TL;DR: In this paper, the authors demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities and demonstrate that reliable secret key establishment can be accomplished at rates on the order of 10 b/s.
Proceedings ArticleDOI

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks

TL;DR: This work surveys publications aimed at improving security and privacy in IMDs and health-related BANs, providing clear definitions and a comprehensive overview of the problem space and presents a visual illustration of this analysis that shows the progression of IMD/BAN research and highlights emerging threats.
Proceedings ArticleDOI

Hardware intrinsic security from D flip-flops

TL;DR: It is shown that against all odds, enough randomness exists in such elements when implemented on an Application-Specific Integrated Circuit (ASIC) to turn the responses of a number of D flip-flops into a secret random sequence allowing to derive keys for use in conjunction with cryptographic algorithms.
Book ChapterDOI

True Random Number Generators

TL;DR: This chapter discusses several examples where use of a true RNG is critical and shows how it can significantly improve security of cryptographic systems, and discusses industrial and research challenges that prevent widespread use of TRNGs.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Non-Uniform Random Variate Generation.

B. J. T. Morgan, +1 more
- 01 Sep 1988 - 
TL;DR: This chapter reviews the main methods for generating random variables, vectors and processes in non-uniform random variate generation, and provides information on the expected time complexity of various algorithms before addressing modern topics such as indirectly specified distributions, random processes, and Markov chain methods.
Book

Non-uniform random variate generation

Luc Devroye
TL;DR: A survey of the main methods in non-uniform random variate generation can be found in this article, where the authors provide information on the expected time complexity of various algorithms, before addressing modern topics such as indirectly specified distributions, random processes and Markov chain methods.
ReportDOI

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.
Related Papers (5)