Cryptology ePrint Archive: Report 2013/338
Available versions in chronological order
20130603:133740 (posted 03-Jun-2013 13:37:40 UTC)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
20130621:085520 (posted 21-Jun-2013 08:55:20 UTC)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
20130624:081405 (posted 24-Jun-2013 08:14:05 UTC)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
20130826:105857 (posted 26-Aug-2013 10:58:57 UTC)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
Original publication (with minor differences): ACM Conference on Computer and Communication Security (CCS), November 2013
20130826:124729 (posted 26-Aug-2013 12:47:29 UTC)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
Original publication (with minor differences): ACM Conference on Computer and Communication Security (CCS), November 2013
20130912:163713 (posted 12-Sep-2013 16:37:13 UTC)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
Original publication (with minor differences): ACM Conference on Computer and Communication Security (CCS), November 2013
20131020:193616 (posted 20-Oct-2013 19:36:16 UTC)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
Original publication (with minor differences): ACM Conference on Computer and Communication Security (CCS), November 2013
[
Cryptology ePrint archive
]