{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T22:30:02Z","timestamp":1775341802913,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_30","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"415-430","source":"Crossref","is-referenced-by-count":91,"title":["True Random Number Generator Embedded in Reconfigurable Hardware"],"prefix":"10.1007","author":[{"given":"Viktor","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Milo\u0161","family":"Drutarovsk\u00fd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"30_CR1","volume-title":"Handbook of Applied Cryptography","author":"J. A. Menezes","year":"1997","unstructured":"Menezes, J. A., Oorschot, P. C., Vanstone, S. A.: Handbook of Applied Cryptography, CRC Press, New York (1997)"},{"key":"30_CR2","series-title":"Lect Notes Comput Sci","first-page":"203","volume-title":"An LSI Random Number Generator (RNG)","author":"R. C. Faifield","year":"1984","unstructured":"Faifield, R. C., Mortenson, R. L., Coulthart, K. B.: An LSI Random Number Generator (RNG). Lecture Notes in Computer Science, Vol. 0196. Springer-Verlag, Berlin Heidelberg New York (1984) 203\u2013230"},{"key":"30_CR3","unstructured":"Jun, B., Kocher, P.: The INTEL Random Number Generator. Cryptography Research, Inc., White Paper prepared for Intel Corporation, April 1999, 1\u20138, http:\/\/www.intel.com"},{"key":"30_CR4","unstructured":"APEX 20K Programmable Logic Device Family. Data Sheet, February 2002, ver. 4.3, 1\u2013116, http:\/\/www.altera.com"},{"key":"30_CR5","unstructured":"APEX II Programmable Logic Device Family. Data Sheet, December 2001, ver. 1.3, 1\u201396, http:\/\/www.altera.com"},{"key":"30_CR6","unstructured":"Fischer, V., Drutarovsk\u00fd, M.: True Random Number Generator in Field Programmable Logic Devices. Submitted to Electronic Letters, Paper Number ELL 32365, April 2002"},{"key":"30_CR7","unstructured":"Superior Jitter management with DLLs. Virtex Tech Topic VTT013 (v1.2), January 21, 2002, 1\u20136, http:\/\/www.xilinx.com"},{"key":"30_CR8","unstructured":"Jitter comparison analysis: APEX 20KE PLL vs. Virtex-E DLL. Technical Brief 70, January 2001, ver.1.1, 1\u20137, http:\/\/www.altera.com"},{"key":"30_CR9","unstructured":"Davies, R. B.: Exclusive OR (XOR) and Hardware Random Number Generators. February 28, 2002, 1\u201311, http:\/\/webnz.com\/robert\/"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Crocker, S., Schiller, J.: Randomness Recommendations for Security. Request for Comments 1750, December 1994, http:\/\/www.ietf.org\/rfc\/rfc1750.txt","DOI":"10.17487\/rfc1750"},{"key":"30_CR11","unstructured":"Davies, R.: Hardware Random Number Generators. Paper presented to the 15th Australian Statistics Conference, July 2000, 1\u201313, http:\/\/statsresearch.co.nz"},{"key":"30_CR12","unstructured":"Marsaglia, G.: DIEHARD: A Battery of Tests of Randomness. http:\/\/stat.fsu.edu\/ geo\/diehard.html"},{"key":"30_CR13","unstructured":"Security Requirements for Cryptographic Modules. Federal Information Processing Standards Publication 140-2, U.S. Department of Commerce\/NIST, 1999, http:\/\/www.nist.gov"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, May 15, 2001, 1\u2013153, http:\/\/www.nist.gov","DOI":"10.6028\/NIST.SP.800-22"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:39:58Z","timestamp":1556825998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_30","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}