Useful Links
1. Introduction to Randomness
2. Statistical Testing of Random Number Generators
3. Classical Pseudorandom Number Generators
4. Cryptographically Secure Pseudorandom Number Generators
5. Theoretical Foundations of Pseudorandomness
6. Applications of Random Number Generation
7. Practical Implementation and Considerations
  1. Mathematics

Pseudorandomness and Random Number Generation

1. Introduction to Randomness
2. Statistical Testing of Random Number Generators
3. Classical Pseudorandom Number Generators
4. Cryptographically Secure Pseudorandom Number Generators
5. Theoretical Foundations of Pseudorandomness
6. Applications of Random Number Generation
7. Practical Implementation and Considerations
  1. Cryptographically Secure Pseudorandom Number Generators
    1. Defining Cryptographic Security
      1. Next-Bit Test
        1. State Compromise Extension Attacks
          1. Backtracking Resistance
            1. Prediction Resistance
            2. Design Principles for CSPRNGs
              1. Security Based on Hard Problems
                1. Use of Cryptographic Primitives
                  1. Entropy Accumulation
                    1. Reseeding Mechanisms
                    2. CSPRNGs Based on Block Ciphers
                      1. Counter Mode DRBG
                        1. Output Feedback Mode DRBG
                          1. Security Considerations
                            1. Performance Trade-offs
                            2. CSPRNGs Based on Hash Functions
                              1. Hash_DRBG Construction
                                1. Security Analysis
                                  1. Implementation Considerations
                                  2. CSPRNGs Based on Stream Ciphers
                                    1. ChaCha20-based Generators
                                      1. Salsa20-based Generators
                                        1. Security and Performance
                                        2. Dual Elliptic Curve DRBG
                                          1. Design and Standardization
                                            1. Backdoor Discovery
                                              1. Security Implications
                                                1. Lessons Learned
                                                2. Standards and Certifications
                                                  1. FIPS 140-2 Requirements
                                                    1. FIPS 140-3 Requirements
                                                      1. NIST SP 800-90A
                                                        1. Common Criteria Evaluation

                                                      Previous

                                                      3. Classical Pseudorandom Number Generators

                                                      Go to top

                                                      Next

                                                      5. Theoretical Foundations of Pseudorandomness

                                                      © 2025 Useful Links. All rights reserved.

                                                      About•Bluesky•X.com