• In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in...
    8 KB (1,021 words) - 06:46, 31 March 2025
  • An oblivious pseudorandom function (OPRF) is a cryptographic function, similar to a keyed-hash function, but with the distinction that in an OPRF two parties...
    28 KB (3,402 words) - 09:41, 22 April 2025
  • In cryptography, a pseudorandom permutation (PRP) is a function that cannot be distinguished from a random permutation (that is, a permutation selected...
    10 KB (1,303 words) - 02:55, 7 July 2023
  • 1\}^{n}\to \{0,1\}^{*}\}} be a class of functions. These functions are the statistical tests that the pseudorandom generator will try to fool, and they are...
    14 KB (1,864 words) - 21:28, 1 May 2025
  • performance of around 4 cycles per byte. SEAL is actually a pseudorandom function family in that it can easily generate arbitrary portions of the keystream...
    1 KB (140 words) - 17:55, 21 February 2025
  • Thumbnail for CBC-MAC
    (see the discussion below) and is currently used to construct a pseudorandom function family and as a component of the CCM mode. The CBC-MAC construct is...
    17 KB (2,867 words) - 06:44, 11 October 2024
  • formation Positive-real function in mathematics Programmed ribosomal frameshifting during mRNA translation Pseudorandom function family Pulse repetition frequency...
    693 bytes (93 words) - 02:01, 3 February 2025
  • A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers...
    28 KB (3,559 words) - 23:54, 22 February 2025
  • a one-way function implies the existence of many other useful concepts, including: Pseudorandom generators Pseudorandom function families Bit commitment...
    14 KB (1,956 words) - 16:22, 30 March 2025
  • In cryptography, the pseudorandom-function advantage (PRF advantage) of an algorithm on a pseudorandom function family is a measure of how effectively...
    2 KB (228 words) - 01:21, 22 October 2022
  • pseudorandom generators is related to the existence of one-way functions through a number of theorems, collectively referred to as the pseudorandom generator...
    14 KB (1,933 words) - 18:11, 26 June 2023
  • Thumbnail for Cryptographic hash function
    guarantees; for example, SHACAL, BEAR and LION. Pseudorandom number generators (PRNGs) can be built using hash functions. This is done by combining a (secret) random...
    49 KB (6,299 words) - 20:13, 4 May 2025
  • cryptographically secure pseudorandom number generator (CSPRNG) or cryptographic pseudorandom number generator (CPRNG) is a pseudorandom number generator (PRNG)...
    29 KB (3,633 words) - 08:24, 16 April 2025
  • Management System (EKMS) Over-the-air rekeying Pseudorandom function family Oblivious Pseudorandom Function Public key infrastructure Turner, Dawn M. "What...
    34 KB (3,512 words) - 09:26, 24 March 2025
  • Thumbnail for Alexander Razborov
    Wigderson Circuit complexity Free group Natural proofs One-way function Pseudorandom function family Resolution (logic) "International Mathematical Union: Rolf...
    10 KB (716 words) - 12:55, 26 October 2024
  • Thumbnail for Quantile function
    simulations employ quantile functions to produce non-uniform random or pseudorandom numbers for use in diverse types of simulation calculations. A sample...
    17 KB (2,174 words) - 18:12, 17 March 2025
  • TwoFish, Serpent and Camellia. Cryptographic hash functions A few cryptographically secure pseudorandom number generators do not rely on cipher algorithms...
    23 KB (1,461 words) - 23:11, 6 March 2025
  • In cryptography, a verifiable random function (VRF) is a public-key pseudorandom function that provides proofs that its outputs were calculated correctly...
    12 KB (1,501 words) - 21:34, 19 February 2025
  • Thumbnail for Hash function
    less than 2b. Consider a pseudorandom number generator function P(key) that is uniform on the interval [0, 2b − 1]. A hash function uniform on the interval...
    50 KB (7,467 words) - 03:03, 8 May 2025
  • Thumbnail for Skein (hash function)
    Skein is a cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard...
    9 KB (822 words) - 12:52, 13 April 2025
  • is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not...
    24 KB (3,485 words) - 05:27, 9 May 2025
  • Thumbnail for Linear congruential generator
    Linear congruential generator (category Pseudorandom number generators)
    linear equation. The method represents one of the oldest and best-known pseudorandom number generator algorithms. The theory behind them is relatively easy...
    43 KB (4,861 words) - 15:40, 14 March 2025
  • Thumbnail for Enigma machine
    are not considered to be Enigma derivatives as their internal ciphering functions are not mathematically identical to the Enigma transform. A unique rotor...
    93 KB (11,280 words) - 20:30, 23 April 2025
  • Certicom and Counterpane Internet Security. Yarrow algorithm, a family of cryptographic pseudorandom number generators Twofish, a symmetric key block cipher John...
    1 KB (85 words) - 16:08, 14 May 2024
  • Turing proposed marriage to Clarke, and subsequently introduced her to his family. When he privately admitted his homosexuality to her, she was reportedly...
    21 KB (1,970 words) - 21:37, 2 April 2025
  • Thumbnail for Salsa20
    Salsa20 (category Cryptographically secure pseudorandom number generators)
    new round function that increases diffusion and increases performance on some architectures. Both ciphers are built on a pseudorandom function based on...
    31 KB (3,577 words) - 20:06, 24 October 2024
  • cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based on mathematical...
    14 KB (1,823 words) - 18:28, 7 January 2025
  • with the NIST hash function SHA-256 in both software and hardware efficiency, achieving up to 36.2 cycles per byte on an Intel Family 6 Model 15 Xeon 5150...
    3 KB (651 words) - 10:35, 27 March 2025
  • algorithm or the Schoof–Elkies–Atkin algorithm, Select a random curve from a family which allows easy calculation of the number of points (e.g., Koblitz curves)...
    39 KB (4,676 words) - 10:16, 27 April 2025
  • Thumbnail for Xorshift
    Xorshift (category Pseudorandom number generators)
    number generators, also called shift-register generators, are a class of pseudorandom number generators that were invented by George Marsaglia. They are a...
    28 KB (3,526 words) - 14:02, 26 April 2025