Book ChapterDOI
Random Number Generators for Cryptographic Applications
Werner Schindler
- pp 5-23
Reads0
Chats0
About:
The article was published on 2009-01-01. It has received 184 citations till now. The article focuses on the topics: Cryptographic primitive & Random number generator attack.read more
Citations
More filters
Proceedings ArticleDOI
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
TL;DR: This paper presents a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space.
Journal ArticleDOI
Information-Theoretically Secret Key Generation for Fading Wireless Channels
TL;DR: In this paper, the authors demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities and demonstrate that reliable secret key establishment can be accomplished at rates on the order of 10 b/s.
Proceedings ArticleDOI
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks
TL;DR: This work surveys publications aimed at improving security and privacy in IMDs and health-related BANs, providing clear definitions and a comprehensive overview of the problem space and presents a visual illustration of this analysis that shows the progression of IMD/BAN research and highlights emerging threats.
Proceedings ArticleDOI
Hardware intrinsic security from D flip-flops
TL;DR: It is shown that against all odds, enough randomness exists in such elements when implemented on an Application-Specific Integrated Circuit (ASIC) to turn the responses of a number of D flip-flops into a secret random sequence allowing to derive keys for use in conjunction with cryptographic algorithms.
Book ChapterDOI
True Random Number Generators
Mario Stipčević,Çetin Kaya Koç +1 more
TL;DR: This chapter discusses several examples where use of a true RNG is critical and shows how it can significantly improve security of cryptographic systems, and discusses industrial and research challenges that prevent widespread use of TRNGs.
References
More filters
Journal ArticleDOI
A mathematical theory of communication
TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Non-Uniform Random Variate Generation.
B. J. T. Morgan,Luc Devroye +1 more
TL;DR: This chapter reviews the main methods for generating random variables, vectors and processes in non-uniform random variate generation, and provides information on the expected time complexity of various algorithms before addressing modern topics such as indirectly specified distributions, random processes, and Markov chain methods.
Book
Non-uniform random variate generation
TL;DR: A survey of the main methods in non-uniform random variate generation can be found in this article, where the authors provide information on the expected time complexity of various algorithms, before addressing modern topics such as indirectly specified distributions, random processes and Markov chain methods.
ReportDOI
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.