{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T19:18:47Z","timestamp":1772219927062,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_31","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"431-449","source":"Crossref","is-referenced-by-count":65,"title":["Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications"],"prefix":"10.1007","author":[{"given":"Werner","family":"Schindler","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Killmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"31_CR1","unstructured":"AIS 20: Functionality Classes and Evaluation Methodology for Deterministic Random Number Generators. Version 1 (02.12.1999) (mandatory if a German IT security certificate is applied for; English translation). http:\/\/www.bsi.bund.de\/zerti.z\/zert\/interpr\/ais20e.pdf"},{"key":"31_CR2","unstructured":"AIS 31: Functionality Classes and Evaluation Methodology for Physical Random Number Generators. Version 1 (25.09.2001) (mandatory if a German IT security certificate is applied for; English translation). http:\/\/www.bsi.bund.de\/zerti.z\/zert\/interpr\/ais31e.pdf"},{"key":"31_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/3-540-48059-5_18","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 1999","author":"V. Bagini","year":"1999","unstructured":"V. Bagini and M. Bucci: A Design of Reliable True Number Generators for Cryptographic Applications. In: \u00c7. K. Ko\u00e7 and C. Paar (eds.): Cryptographic Hardware and Embedded Systems-CHES 1999. Springer, Lecture Notes in Computer Science, Vol. 1717, Berlin (1999), 204\u2013218."},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/BFb0052242","volume-title":"Crypto\u201997","author":"M. Bellare","year":"1997","unstructured":"M. Bellare, S. Goldwasser, D. Micciancio: \u201cPseudo-Random\u201d Number Generation Within Cryptographic Algorithms: The DSS Case. In: B. Kaliski (ed.): Crypto\u201997. Springer, Lecture Notes in Computer Science, Vol. 1294, Berlin (1997), 277\u2013291."},{"key":"31_CR5","unstructured":"Lucent Technologies, Bell Labs: Scientist discovers significant flaw that would have threatened the integrity of on-line transactions, press article at http:\/\/www.lucent.com\/press\/0201\/010205.bla.html ."},{"key":"31_CR6","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali: How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Comput., Vol. 13 (1984), 850\u2013864.","journal-title":"SIAM J. Comput."},{"key":"31_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-49162-7_3","volume-title":"Public Key Cryptography-PKC 99","author":"J.-S. Coron","year":"1999","unstructured":"J.-S. Coron: On the Security of Random Sources. In: H. Imai and Y. Zheng (eds.): Public Key Cryptography-PKC 99. Springer, Lecture Notes in Computer Science, Vol. 1560, Berlin (1999), 29\u201342."},{"key":"31_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/3-540-48892-8_5","volume-title":"Selected Areas in Cryptography-SAC\u2019 98","author":"J.-C. Coron","year":"1999","unstructured":"J.-C. Coron, D. Naccache: An Accurate Evaluation of Maurer\u2019s Universal Test. In: S. Tavares and H. Meijer (eds.): Selected Areas in Cryptography-SAC\u2019 98. Springer, Lecture Notes in Computer Science, Vol. 1556, Berlin (1999), 57\u201371."},{"key":"31_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-8643-8","volume-title":"Non-Uniform Random Variate Generation","author":"L. Devroye","year":"1986","unstructured":"L. Devroye: Non-Uniform Random Variate Generation. Springer, New York (1986)."},{"key":"31_CR10","unstructured":"IEEE: IEEE P1363 \/ D8 (Draft Version 8), Annex D, Standard Specifications for Public Key Cryptography (05.10.1998). http:\/\/www.informatik.tu-darmstadt.de\/TI\/Veroe.entlichung\/Artikel\/Kryptographie\/PublicKeyAllgemein\/P1363-D-10-05-98.pdf"},{"key":"31_CR11","unstructured":"Intel Platform Security Division: The Intel Random Number Generator. Intel Corporation (1999)."},{"key":"31_CR12","unstructured":"Information Technology Security Evaluation Criteria (ITSEC); Provisional Harmonised Criteria, Version 1.2, June 1991"},{"key":"31_CR13","unstructured":"Information Technology Security Evaluation Manual (ITSEM); Provisional Harmonised Methodology, Version 1.0, September 1993"},{"key":"31_CR14","volume-title":"100 Statistical Tests","author":"G. K. Kanji","year":"1995","unstructured":"G. K. Kanji: 100 Statistical Tests. Sage Publications, London (1995)."},{"key":"31_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-69710-1_12","volume-title":"Fast Software Encryption-FSE 1998","author":"J. Kelsey","year":"1998","unstructured":"J. Kelsey, B. Schneier, D. Wagner, C. Hall: Cryptanalytic Attacks on Pseudorandom Number Generators. In: S. Vaudenay (ed.): Fast Software Encryption-FSE 1998, Springer, Lecture Notes in Computer Science, Vol. 1372, Berlin (1998), 168\u2013188."},{"key":"31_CR16","unstructured":"W. Killmann, W. Schindler: A Proposal for: Functionality Classes and Evaluation Methodology for True (Physical) Random Number Generators. Version 3.1 (25.09.2001), mathematical-technical reference of [2] (English translation); http:\/\/www.bsi.bund.de\/zerti.z\/zert\/interpr\/trngk31e.pdf"},{"key":"31_CR17","volume-title":"The Art of Computer Programming","author":"D. E. Knuth","year":"1981","unstructured":"D. E. Knuth: The Art of Computer Programming. Vol. 2, Addison-Wesley, London (1981)."},{"key":"31_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/3-540-48059-5_19","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 1999","author":"D. P. Maher","year":"1999","unstructured":"D. P. Maher, R. J. Rance: Random Number Generators Founded on Signal and Information Theory. In: \u00c7. K. Ko\u00e7, C. Paar (eds.): Cryptographic Hardware and Embedded Systems-CHES 1999. Springer, Lecture Notes in Computer Science, Vol. 1717, Berlin (1999), 219\u2013230."},{"key":"31_CR19","unstructured":"G. Marsaglia: Diehard (Test Suite for Random Number Generators). http:\/\/www.stat.fsu.edu\/~geo\/diehard.html"},{"key":"31_CR20","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/BF00193563","volume":"5","author":"U. Maurer","year":"1992","unstructured":"U. Maurer: A Universal Statistical Test for Random Bit Generators. J. Crypt. 5 (1992), 89\u2013105.","journal-title":"J. Crypt."},{"key":"31_CR21","unstructured":"NIST: Security Requirements for Cryptographic Modules. FIPS PUB 140-1 (11.04.1994). http:\/\/www.itl.nist.gov\/.pspubs\/.p140-1.htm"},{"key":"31_CR22","unstructured":"NIST: Security Requirements for Cryptographic Modules. FIPS PUB 140-2 (25.05.2001) and Change Notice 1 (10.10.2001). http:\/\/www.csrc.nist.gov\/publications\/.ps\/.ps140-2\/.ps1402.pdf"},{"key":"31_CR23","unstructured":"NIST: Digital Signature Standard (DSS). FIPS PUB 186-2 (27.01.2000) with Change Notice 1 (5.10.2001). http:\/\/www.csrc.nist.gov\/publications\/.ps\/.ps186-2\/.ps186-2-change1.pdf"},{"key":"31_CR24","unstructured":"A. Rukhin et al.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22 with revisions dated 15.05.2001. http:\/\/www.csrc.nist.gov\/rng\/SP800-22b.pdf"},{"key":"31_CR25","unstructured":"J. O. Pliam: The Disparity Between the Work and the Entropy in Cryptology (01.02.1999). http:\/\/www.eprint.iacr.org\/complete\/"},{"key":"31_CR26","unstructured":"W. Schindler: Functionality Classes and Evaluation Methodology for Deterministic Random Number Generators. Version 2.0 (02.12.1999), mathematical-technical reference of [1] (English translation); http:\/\/www.bsi.bund.de\/zerti.z\/zert\/interpr\/ais20e.pdf"},{"key":"31_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-44709-1_10","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"W. Schindler","year":"2001","unstructured":"W. Schindler: Efficient Online Tests for True Random Number Generators. In: \u00c7.K. Ko\u00e7, D. Naccache, C. Paar (eds.): Cryptographic Hardware and Embedded Systems-CHES 2001. Springer, Lecture Notes in Computer Science, Vol. 2162, Berlin (2001), 103\u2013117."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,26]],"date-time":"2020-04-26T07:51:21Z","timestamp":1587887481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}