The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used toâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2013

2013

Pseudo random numbers are used for various purposes. Pseudo random number generators (PRNGs) are useful tools to provide pseudoâ€¦Â (More)

Is this relevant?

2013

2013

- Daniel J. Bernstein, Yun-An Chang, +4 authors Nicko van Someren
- ASIACRYPT
- 2013

This paper explains how an attacker can efficiently factor 184 distinct RSA keys out of more than two million 1024-bit RSA keysâ€¦Â (More)

Is this relevant?

2013

2013

- Lequan Min, Yuqun Zhang, Lijiao Zhang, Kexin Hu
- 2013 Ninth International Conference onâ€¦
- 2013

In this paper, a novel 3-dimensional discrete chaotic map is introduced. The calculated Lyapunov exponents of the map are 0.0705â€¦Â (More)

Is this relevant?

2009

2009

- Boyan Valtchanov, Viktor Fischer, Alain Aubert
- 2009 3rd International Conference on Signalsâ€¦
- 2009

The paper presents several modifications of the True Random Number Generator proposed by Kohlbrenner and Gaj in 2004. Theâ€¦Â (More)

Is this relevant?

2006

2006

- Ping Li, Zhong Li, Wolfgang A. Halang, Guanrong Chen
- I. J. Bifurcation and Chaos
- 2006

A novel multiple-output pseudo-random-bit generator (PRBG) based on a coupled map lattice (CML) consisting of skew tent mapsâ€¦Â (More)

Is this relevant?

2006

2006

- Yaobin Mao, Liu Cao, Wenbo Liu
- 2006 International Conference on Communicationsâ€¦
- 2006

According to the postulation of Shannon's theoretical unbreakable cryptography, in practice, a pseudo-random bit sequence (PRBSâ€¦Â (More)

Is this relevant?

2006

2006

- Tommaso Addabbo, Massimo Alioto, Ada Fort, Santina Rocchi, Valerio Vignoli
- IEEE Transactions on Circuits and Systems Iâ€¦
- 2006

In this paper, the guidelines to design a true random bit generator (TRBG) circuit with a predefined minimum entropy areâ€¦Â (More)

Is this relevant?

2006

2006

- Ulrich Kaiser
- IACR Cryptology ePrint Archive
- 2006

Since stream ciphers have the reputation to be inefficient in software applications the new stream cipher Hermes8F has beenâ€¦Â (More)

Is this relevant?

2005

2005

FIPS 140-2 does not presently have security requirements that cover software-hardening techniques. Software hardening is a methodâ€¦Â (More)

Is this relevant?

2004

2004

- Janusz Szczepanski, Elek Wajnryb, JosÃ© MarÃa AmigÃ³, Maria V. Sanchez-Vives, Mel Slater
- Computers & Security
- 2004

Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to useâ€¦Â (More)

Is this relevant?