Cryptology ePrint Archive: Report 2014/167
Available versions in chronological order
20140303:223817 (posted 03-Mar-2014 22:38:17 UTC)
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
20140303:225529 (posted 03-Mar-2014 22:55:29 UTC)
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
20140313:224838 (posted 13-Mar-2014 22:48:38 UTC)
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
20140417:054420 (posted 17-Apr-2014 05:44:20 UTC)
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
20140607:222856 (posted 07-Jun-2014 22:28:56 UTC)
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
Original publication (with major differences): IACR-CRYPTO-2014
[
Cryptology ePrint archive
]