{"categories":["crypt"],"provider_url":"https://hatena.blog","title":" \u30e1\u30e2","provider_name":"Hatena Blog","image_url":null,"published":"2007-11-06 21:58:56","blog_url":"https://186.hatenablog.com/","author_url":"https://blog.hatena.ne.jp/smoking186/","height":"190","version":"1.0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20071106%2F1194353936\" title=\" \u30e1\u30e2 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_title":"186 @ hatenablog","description":"Cryptology ePrint Archive 2007/419 - L. Dorrendorf, Z. Gutterman, B. Pinkas \"Cryptanalysis of the Random Number Generator of the Windows Operating System\" MS\u306eWindows2000\u3067\u4f7f\u308f\u308c\u3066\u3044\u308bPRNG\u306b\u5bfe\u3059\u308b\u653b\u6483. \u30d0\u30a4\u30ca\u30ea\u30d5\u30a1\u30a4\u30eb\u3092\u89e3\u6790\u3057\u3066\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3092\u5fa9\u5143\u3057\u305f\u3089\u3057\u3044. \u3056\u3063\u3068\u898b\u308b\u306bRC4\u3068SHA1\u3092\u7d44\u307f\u5408\u308f\u305b\u3066\u3044\u308b\u69d8\u5b50.","type":"rich","url":"https://186.hatenablog.com/entry/20071106/1194353936","width":"100%","author_name":"smoking186"}