The security of many cryptographic constructions depends on random number generators for providing unpredictable keys, nonces, initialization vectors and other parameters. Modern operating systems implement cryptographic pseudo-random number generators (PRNGs) to fulfill this need. Performance counters and other system parameters are often used as a low-entropy source to initialize (seed) the generators. We perform an experiment to analyze all performance counters in standard installation of Microsoft Windows 7 operating system, and assess their suitability as entropy sources. Besides selecting top 19 counters, we analyze their mutual information (independence) as well as robustness in the virtual environment. Final selection contains 14 co...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
Running window entropy is a useful tool for malware analysis, network anomaly detection, and other c...
This thesis is focused on exploring the sources of entropy. It includes a description of random numb...
Abstract: One of the services provided by the operating system to the applications is random number ...
The availability of a random number generator with high cryptographic qualities on a computer is one...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in...
Pseudo-random number generators (PRNGs) are a critical infrastructure for cryptography and security ...
déposé sur Cryptology ePrint Archive (http://eprint.iacr.org/)The Linux pseudorandom number generato...
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number g...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
The magnitude of the information content associated with a particular implementation of a Physical U...
We discuss a monitoring system aiming to select, among a set of integrated entropy sources affected ...
To achieve true randomness of numbers, the entropy source needs to be efficient. The statistical tes...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
Running window entropy is a useful tool for malware analysis, network anomaly detection, and other c...
This thesis is focused on exploring the sources of entropy. It includes a description of random numb...
Abstract: One of the services provided by the operating system to the applications is random number ...
The availability of a random number generator with high cryptographic qualities on a computer is one...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in...
Pseudo-random number generators (PRNGs) are a critical infrastructure for cryptography and security ...
déposé sur Cryptology ePrint Archive (http://eprint.iacr.org/)The Linux pseudorandom number generato...
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number g...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
The magnitude of the information content associated with a particular implementation of a Physical U...
We discuss a monitoring system aiming to select, among a set of integrated entropy sources affected ...
To achieve true randomness of numbers, the entropy source needs to be efficient. The statistical tes...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
Running window entropy is a useful tool for malware analysis, network anomaly detection, and other c...