120 11 LINUX Mixing function, p.126 ,
Leakage-Resilient Symmetric Encryption via Re-keying, Cryptographic Hardware and Embedded Systems ? CHES 2013, pp.471-488, 2013. ,
DOI : 10.1007/978-3-642-40349-1_27
URL : https://hal.archives-ouvertes.fr/hal-01094306
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks -Extended Version, Cryptology ePrint Archive, vol.6, p.91, 2015. ,
RELIC is an Efficient LIbrary for Cryptography, p.135 ,
Simultaneous Hardcore Bits and Cryptography against Memory Attacks, TCC 2009: 6th Theory of Cryptography Conference, pp.474-495, 2009. ,
DOI : 10.1007/978-3-642-00457-5_28
I forgot your password: randomness attacks against php applications, Proceedings of the 21st USENIX conference on Security symposium, pp.6-6 ,
On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, vol.14, issue.2, pp.101-119, 2001. ,
DOI : 10.1007/s001450010016
Masking and leakage-resilient primitives: One, the other(s) or both? Cryptography and Communications, pp.163-184, 2015. ,
Ieee p1363: A standard for rsa, diffie-hellman, and elliptic-curve cryptography (abstract), ACM CCS 05: 12th Conference on Computer and Communications Security, pp.203-212, 1996. ,
Recommendation for random number generation using deterministic random bit generators. NIST Special Publication 800-90A, p.69, 2012. ,
The Security of Cipher Block Chaining, Lecture Notes in Computer Science, vol.839, pp.341-358, 1994. ,
DOI : 10.1007/3-540-48658-5_32
Biclique Cryptanalysis of the Full AES, Advances in Cryptology ? ASI- ACRYPT 2011, pp.344-371, 2011. ,
DOI : 10.1007/978-3-642-25385-0_19
The Security of Triple Encryption and a Framework??for??Code-Based??Game-Playing??Proofs, Lecture Notes in Computer Science, vol.4004, issue.9, pp.409-426, 2006. ,
DOI : 10.1007/11761679_25
Differential fault analysis of secret key cryptosystems ,
DOI : 10.1007/BFb0052259
Advances in Cryptology ? CRYPTO'97, volume 1294 of Lecture Notes in Computer Science, pp.513-525, 1997. ,
True Random Number Generators Secure in a Changing Environment, Cryptographic Hardware and Embedded Systems ? CHES 2003, pp.166-180, 2003. ,
DOI : 10.1007/978-3-540-45238-6_14
Forward-Security in Private-Key Cryptography, Topics in Cryptology ? CT-RSA 2003, pp.1-18, 2003. ,
DOI : 10.1007/3-540-36563-X_1
Unbiased bits from sources of weak randomness and probabilistic communication complexity (extended abstract), 26th Annual Symposium on Foundations of Computer Science, pp.429-442, 1985. ,
Characterization of Real-Life PRNGs under Partial State Corruption, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1004-1015, 2014. ,
DOI : 10.1145/2660267.2660377
URL : https://hal.archives-ouvertes.fr/hal-01084490
Cryptanalysis of the windows random number generator, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.476-485, 2007. ,
DOI : 10.1145/1315245.1315304
A Practice-Oriented Treatment of Pseudorandom Number Generators, Advances in Cryptology ? EUROCRYPT 2002 41st Annual ACM Symposium on Theory of Computing, pp.368-383, 2002. ,
DOI : 10.1007/3-540-46035-7_24
Perfectly Secure Password Protocols in the Bounded Retrieval Model, TCC 2006: 3rd Theory of Cryptography Conference, pp.225-244, 2006. ,
DOI : 10.1007/11681878_12
Leakage-Resilient Cryptography, 2008 49th Annual IEEE Symposium on Foundations of Computer Science, pp.293-302, 2008. ,
DOI : 10.1109/FOCS.2008.56
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks, Lecture Notes in Computer Science, vol.6223, issue.4, pp.21-40, 2010. ,
DOI : 10.1007/978-3-642-14623-7_2
Security analysis of pseudo-random number generators with input, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.647-658, 2013. ,
DOI : 10.1145/2508859.2516653
URL : https://hal.archives-ouvertes.fr/hal-00864431
Randomness condensers for efficiently samplable, seed-dependent sources 18 [DSS00] Digital signature standard (dss), fips pub 186-2 with change notice How to eat your entropy and have it too -optimal recovery strategies for compromised RNGs, TCC 2012: 9th Theory of Cryptography Conference FIPS PUB 186-2, U.S. Department of Commerce Advances in Cryptology ? CRYPTO 2014, pp.618-635, 2000. ,
Intrusion-Resilience Via the Bounded-Storage Model, TCC 2006: 3rd Theory of Cryptography Conference, pp.207-224, 2006. ,
DOI : 10.1007/11681878_11
RFC 4086 -Randomness Requirements for Security, 2003. ,
Low-Level Software Security by Example, Handbook of Information and Communication Security, pp.633-658, 2010. ,
DOI : 10.1007/978-3-642-04117-4_30
Practical Leakage-Resilient Symmetric Cryptography, Cryptographic Hardware and Embedded Systems ? CHES 2012, pp.213-232, 2012. ,
DOI : 10.1007/978-3-642-33027-8_13
HMAC is a randomness extractor and applications to TLS, ASIACCS 08: 3rd Conference on Computer and Communications Security, pp.21-32, 2008. ,
Cryptography Engineering: Design Principles and Practical Applications, p.135, 2010. ,
DOI : 10.1002/9781118722367
Lecture notes on cryptography, p.114, 2001. ,
How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.792-807, 1986. ,
DOI : 10.1145/6490.6503
Entropy transfers in the Linux Random Number Generator, p.119, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00738638
Analysis of the linux random number generator Software generation of practically strong random numbers, IEEE Symposium on Security and Privacy Proceedings of the 7th USENIX Security Symposium Eric Wustrow, and J. Alex Halderman. Mining your Ps and Qs: Detection of widespread weak keys in network devices Proceedings of the 21st USENIX Security Symposium, pp.371-385, 2005. ,
A Pseudorandom Generator from any One-way Function, IBM14] Recent Fixes in IBM SecureRandom, pp.1364-1396, 1999. ,
DOI : 10.1137/S0097539793244708
A personal view of average-case complexity, Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference, pp.134-147, 1995. ,
DOI : 10.1109/SCT.1995.514853
Predictability of android OpenSSL's pseudo random number generator, ACM CCS 13: 20th Conference on Computer and Communications Security, pp.659-668, 2013. ,
A proposal for: Functionality classes for random number generators, AIS, vol.20, issue.3, p.31, 2011. ,
32-bit cyclic redundancy codes for Internet applications, Proceedings International Conference on Dependable Systems and Networks, pp.459-472, 2002. ,
DOI : 10.1109/DSN.2002.1028931
Cryptanalytic Attacks on Pseudorandom Number Generators, Fast Software Encryption ? FSE'98, pp.168-188, 1998. ,
DOI : 10.1007/3-540-69710-1_12
Public keys, Advances in Cryptology ? CRYPTO 2012, pp.626-642, 2012. ,
The linux pseudorandom number generator revisited, Cryptology ePrint Archive, vol.251, issue.119, p.124, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01005441
The Sum of PRPs Is a Secure PRF, Lecture Notes in Computer Science, vol.1807, pp.470-484, 2000. ,
DOI : 10.1007/3-540-45539-6_34
Randomly Failed! The State of Randomness in Current Java Implementations, Topics in Cryptology ? CT-RSA 2013, pp.129-144, 2007. ,
DOI : 10.1007/978-3-642-36095-4_9
Physically Observable Cryptography, TCC 2004: 1st Theory of Cryptography Conference, pp.278-296, 2004. ,
DOI : 10.1007/978-3-540-24638-1_16
The insecurity of the digital signature algorithm with partially known nonces, Journal of Cryptology, vol.15, issue.3 5, pp.151-176, 2002. ,
More deterministic simulation in logspace, Proceedings of the twenty-fifth annual ACM symposium on Theory of computing , STOC '93, pp.235-244, 1993. ,
DOI : 10.1145/167088.167162
Masking against Side-Channel Attacks: A Formal Security Proof, Advances in Cryptology ? EURO- CRYPT 2013, pp.142-159, 2013. ,
DOI : 10.1007/978-3-642-38348-9_9
RECENT DEVELOPMENTS IN EXPLICIT CONSTRUCTIONS OF EXTRACTORS, Bulletin of the EATCS, vol.77, pp.67-95, 2002. ,
DOI : 10.1142/9789812562494_0013
A computational introduction to number theory and algebra, p.16, 2006. ,
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions, Advances in Cryptology ? CRYPTO 2013, Part I, pp.335-352, 2013. ,
DOI : 10.1007/978-3-642-40041-4_19
Generating quasi-random sequences from slightly-random sources (extended abstract), 25th Annual Symposium on Foundations of Computer Science, pp.434-440, 1984. ,
A complete problem for statistical zero knowledge, Journal of the ACM, vol.50, issue.2, pp.196-249, 2003. ,
DOI : 10.1145/636865.636868
Extracting randomness from samplable distributions, Proceedings 41st Annual Symposium on Foundations of Computer Science, pp.32-42, 2000. ,
DOI : 10.1109/SFCS.2000.892063
Pseudorandomness, draft survey monograph, p.20, 2012. ,
Memory errors: The past, the present, and the future, Proceedings of the 15th International Conference on Research in Attacks, Intrusions, and Defenses, pp.86-106, 2012. ,
Soft Analytical Side-Channel Attacks, Palash Sarkar and Tetsu Iwata, pp.282-296, 2014. ,
DOI : 10.1007/978-3-662-45611-8_15
URL : https://hal.archives-ouvertes.fr/hal-01096218
13. various techniques used in connection with random digits, p.13, 1951. ,
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness, Topics in Cryptology ? CT-RSA 2013, pp.223-238, 2013. ,
DOI : 10.1007/978-3-642-36095-4_15
Practical leakage-resilient pseudorandom generators, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.141-151, 2010. ,
DOI : 10.1145/1866307.1866324