Lines Matching full:yarrow
2070 (e.g. Yarrow).
2764 Below is a simple snippet to read 10 bytes from Yarrow. It is important to note that this snippet is {\bf NOT} secure since
2788 printf("Read %lu bytes from yarrow\n",
2849 \hline Yarrow & yarrow\_desc & Fast short-term PRNG \\
2860 \subsubsection{Yarrow}
2861 Yarrow is fast PRNG meant to collect an unspecified amount of entropy from sources
2870 usage. It is faster than the default implementation of Yarrow\footnote{Yarrow has been implemented
2874 Fortuna is slightly less flexible than Yarrow in the sense that it only works with the AES block cipher
2879 Fortuna is more secure than Yarrow in the sense that attackers who learn parts of the entropy being
2880 added to the PRNG learn far less about the state than that of Yarrow. Without getting into to many
2882 to learn information from the PRNGs output about the internal state. Yarrow on the other hand, cannot
2906 Unlike Yarrow and Fortuna, all of the entropy (and hence security) of this algorithm rests in the data
2914 key it from the output of Fortuna (or Yarrow), and use it to encrypt messages. It is also ideal for
2999 /* register yarrow */
3001 printf("Error registering Yarrow\n");
3006 if ((err = rng_make_prng(128, find_prng("yarrow"), &prng, NULL))
3013 if ((err = ecc_make_key(&prng, find_prng("yarrow"), 24, &mykey))
5026 pthreads based mutex locking in various routines such as the Yarrow and Fortuna PRNGs, the fixed point ECC multiplier, and other routines.
5279 dependency issues which are noted in the file. For instance, Yarrow requires CTR chaining mode, a block