مولد البتات العشوائية الحتمي ذو المنحنيين الإهليلجيين (Arabic Wikipedia)

Analysis of information sources in references of the Wikipedia article "مولد البتات العشوائية الحتمي ذو المنحنيين الإهليلجيين" in Arabic language version.

refsWebsite
Global rank Arabic rank
1st place
1st place
low place
low place
355th place
312th place
2nd place
5th place
388th place
867th place
193rd place
246th place
12th place
25th place
120th place
247th place
low place
low place
7,215th place
low place
5,032nd place
low place
7th place
23rd place
49th place
57th place
low place
low place
800th place
1,795th place
low place
low place
low place
low place
214th place
998th place
low place
low place
low place
low place
629th place
262nd place
8th place
10th place
6,694th place
4,745th place
451st place
1,108th place
8,888th place
low place
153rd place
250th place
652nd place
834th place
low place
low place
low place
low place
453rd place
4,347th place

0xbadc0de.be (Global: low place; Arabic: low place)

blog.0xbadc0de.be

ams.org (Global: 451st place; Arabic: 1,108th place)

arstechnica.com (Global: 388th place; Arabic: 867th place)

baltimoresun.com (Global: 453rd place; Arabic: 4,347th place)

articles.baltimoresun.com

bbc.co.uk (Global: 8th place; Arabic: 10th place)

cryptographyengineering.com (Global: low place; Arabic: low place)

blog.cryptographyengineering.com

doi.org (Global: 2nd place; Arabic: 5th place)

  • Barker، E. B.؛ Kelsey، J. M. (يناير 2012). "Recommendations for Random Number Generation Using Deterministic Random Bit Generators (Revised)" (PDF). المعهد الوطني للمعايير والتقانة. DOI:10.6028/NIST.SP.800-90A. NIST SP 800-90. مؤرشف (PDF) من الأصل في 2013-10-09. اطلع عليه بتاريخ 2013-09-11. {{استشهاد بدورية محكمة}}: الاستشهاد بدورية محكمة يطلب |دورية محكمة= (مساعدة)
  • Young, Adam; Yung, Moti (11 May 1997). "Kleptography: Using Cryptography Against Cryptography". Advances in Cryptology — EUROCRYPT '97. Lecture Notes in Computer Science (بالإنجليزية). Springer, Berlin, Heidelberg. Vol. 1233. pp. 62–74. DOI:10.1007/3-540-69053-0_6. ISBN:978-3-540-69053-5 – via ريسيرش غيت.
  • Young, Adam; Yung, Moti (17 Aug 1997). "The prevalence of kleptographic attacks on discrete-log based cryptosystems". Advances in Cryptology — CRYPTO '97. Lecture Notes in Computer Science (بالإنجليزية). Springer, Berlin, Heidelberg. Vol. 1294. pp. 264–276. DOI:10.1007/bfb0052241. ISBN:978-3-540-63384-6 – via ريسيرش غيت.
  • Brown, Daniel R. L.; Gjøsteen, Kristian (19 Aug 2007). "A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator". Advances in Cryptology - CRYPTO 2007. Lecture Notes in Computer Science (بالإنجليزية). Springer, Berlin, Heidelberg. Vol. 4622. pp. 466–481. DOI:10.1007/978-3-540-74143-5_26. ISBN:978-3-540-74142-8. Archived from the original on 2018-02-16. Retrieved 2018-02-15 – via أرشيف التشفير الإلكتروني.
  • Young, Adam; Yung, Moti (17 Aug 1997). "The prevalence of kleptographic attacks on discrete-log based cryptosystems". Advances in Cryptology — CRYPTO '97. Lecture Notes in Computer Science (بالإنجليزية). Springer, Berlin, Heidelberg. Vol. 1294. pp. 264–276. DOI:10.1007/bfb0052241. ISBN:978-3-540-63384-6 – via ريسيرش غيت.Young, Adam; Yung, Moti (1997-08-17). "The prevalence of kleptographic attacks on discrete-log based cryptosystems". Advances in Cryptology — CRYPTO '97. Lecture Notes in Computer Science. Vol. 1294. Springer, Berlin, Heidelberg. pp. 264–276. doi:10.1007/bfb0052241. ISBN 978-3-540-63384-6 – via ResearchGate.

espacenet.com (Global: 800th place; Arabic: 1,795th place)

worldwide.espacenet.com

  • US 2007189527, Brown, Daniel R. L. & Vanstone, Scott A., "Elliptic curve random number generation" 
  • [1] 

iacr.org (Global: 5,032nd place; Arabic: low place)

eprint.iacr.org

ieee.org (Global: 652nd place; Arabic: 834th place)

spectrum.ieee.org

ietf.org (Global: 214th place; Arabic: 998th place)

iso.org (Global: 629th place; Arabic: 262nd place)

jeffreycarr.blogspot.dk (Global: low place; Arabic: low place)

juniper.net (Global: low place; Arabic: low place)

forums.juniper.net

marc.info (Global: low place; Arabic: low place)

microsoft.com (Global: 153rd place; Arabic: 250th place)

msdn.microsoft.com

nist.gov (Global: 355th place; Arabic: 312th place)

nist.gov

csrc.nist.gov

  • Barker، E. B.؛ Kelsey، J. M. (يناير 2012). "Recommendations for Random Number Generation Using Deterministic Random Bit Generators (Revised)" (PDF). المعهد الوطني للمعايير والتقانة. DOI:10.6028/NIST.SP.800-90A. NIST SP 800-90. مؤرشف (PDF) من الأصل في 2013-10-09. اطلع عليه بتاريخ 2013-09-11. {{استشهاد بدورية محكمة}}: الاستشهاد بدورية محكمة يطلب |دورية محكمة= (مساعدة)
  • http://csrc.nist.gov/groups/ST/crypto-review/documents/dualec_in_X982_and_sp800-90.pdf نسخة محفوظة 2015-11-29 على موقع واي باك مشين. [ملف PDF عاري الوصلة]
  • "NIST: "DRBG Validation List"". مؤرشف من الأصل في 2013-12-29. اطلع عليه بتاريخ 2013-12-30.

ntnu.no (Global: 7,215th place; Arabic: low place)

math.ntnu.no

nytimes.com (Global: 7th place; Arabic: 23rd place)

bits.blogs.nytimes.com

nytimes.com

researchgate.net (Global: 120th place; Arabic: 247th place)

reuters.com (Global: 49th place; Arabic: 57th place)

rpw.sh (Global: low place; Arabic: low place)

rsa.com (Global: low place; Arabic: low place)

blogs.rsa.com

schneier.com (Global: 8,888th place; Arabic: low place)

techdirt.com (Global: 6,694th place; Arabic: 4,745th place)

theguardian.com (Global: 12th place; Arabic: 25th place)

veridicalsystems.com (Global: low place; Arabic: low place)

web.archive.org (Global: 1st place; Arabic: 1st place)

wired.com (Global: 193rd place; Arabic: 246th place)

wired.com

archive.wired.com

yp.to (Global: low place; Arabic: low place)

rump2007.cr.yp.to