International audiencePseudo-random number generators (PRNGs) are widely used as a randomness source in cryptographic applications. It is essential for their security that the internal state, in which the entropy is accumulated, is kept secret. However, this assumption is unrealistic for PRNGs that are implemented in software, as the internal state can be partially corrupted through memory corruption bugs such as buffer overflows or through faults attacks. The recent Heartbleed bug gives us a concrete illustration of this vulnerability. In this work we study several widely used PRNGs from different popular providers, including OpenSSL, OpenJDK, Android, IBM and Bouncy Castle and we characterize how they handle their internal states. We form...
The ability to produce random numbers is an important aspect of many cryptographic applications. Thi...
International audienceSecurity of cryptographic systems depends significantly on security of secret ...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Abstract. A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers...
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number g...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Pseudo-random number generators (PRNGs) are a critical infrastructure for cryptography and security ...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
International audiencePhysical True Random Number Generator (P-TRNG) is a cryptographic primitive ba...
Pseudorandom Generators (PRGs) play an important role in security of systems and cryptographic mecha...
The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in...
The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in...
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
In this work we demonstrate various weaknesses of the random number generator (RNG) in the OpenSSL c...
The ability to produce random numbers is an important aspect of many cryptographic applications. Thi...
International audienceSecurity of cryptographic systems depends significantly on security of secret ...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Abstract. A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers...
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number g...
Random number generation is a critical issue in numerous cryptographic applications: it is used for ...
Pseudo-random number generators (PRNGs) are a critical infrastructure for cryptography and security ...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
International audiencePhysical True Random Number Generator (P-TRNG) is a cryptographic primitive ba...
Pseudorandom Generators (PRGs) play an important role in security of systems and cryptographic mecha...
The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in...
The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in...
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To ...
In this work we demonstrate various weaknesses of the random number generator (RNG) in the OpenSSL c...
The ability to produce random numbers is an important aspect of many cryptographic applications. Thi...
International audienceSecurity of cryptographic systems depends significantly on security of secret ...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...