{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T21:05:00Z","timestamp":1772831100640,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_13","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"114-120","source":"Crossref","is-referenced-by-count":40,"title":["Cryptographic Randomness from Air Turbulence in Disk Drives"],"prefix":"10.1007","author":[{"given":"Don","family":"Davis","sequence":"first","affiliation":[]},{"given":"Ross","family":"Ihaka","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Fenstermacher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","first-page":"111","volume":"1","author":"S.D. Abrahamson","year":"1991","unstructured":"S.D. Abrahamson, C. Chiang, and J.K. Eaton, \u201cFlow structure in head-disk assemblies and implications for design,\u201d Adv. Info. Storage Syst., 1 (1991). pp. 111\u2013132.","journal-title":"Adv. Info. Storage Syst."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"W. Alexi, B. Chor, O. Goldreich, and C.P. Schnorr, \u201cRSA and Rabin functions: certain parts are as hard as the whole,\u201d Proc. 25th IEEE Symp. on Foundations of Computer Science, 1984, pp. 449\u2013457; see also SIAM J. on Comput., 17(2) (1988).","DOI":"10.1109\/SFCS.1984.715947"},{"key":"13_CR3","volume-title":"Order Within Chaos: Towards a Deterministic Approach to Turbulence","author":"P. Berg\u00e9","year":"1984","unstructured":"P. Berg\u00e9, Y. Pomeau, and C. Vidal, Order Within Chaos: Towards a Deterministic Approach to Turbulence, Wiley, New York, 1984."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"M. Blum, \u201cIndependent unbiased coin flips from a correlated biased source: a finite state Markov chain,\u201d Proc. 25th Ann. Symp. on Foundations of Computer Science, 1984. pp. 425\u201333.","DOI":"10.1109\/SFCS.1984.715944"},{"issue":"2","key":"13_CR5","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"L. Blum, M. Blum, and M. Shub, \u201cA simple unpredictable pseudo-random number generator,\u201d SIAM J. Comput., 15(2) (1986). pp. 364\u201383.","journal-title":"SIAM J. Comput."},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali, \u201cHow to generate cryptographically strong sequences of pseudo-random bits,\u201d SIAM J. Comput., 13(4) (Nov. 1984). pp. 850\u2013864.","journal-title":"SIAM J. Comput."},{"key":"13_CR7","volume-title":"Time Series: Data Analysis and Theory","author":"D. Brillinger","year":"1981","unstructured":"D. Brillinger, Time Series: Data Analysis and Theory, Holden-Day, San Francisco, 1981. Addendum."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"B. Chor and O. Goldreich, \u201cUnbiased bits from sources of weak randomness and probabilistic communication complexity,\u201d Proc. 26th Ann. Symp. on Foundations of Computer Science, 1985. pp. 429\u201342.","DOI":"10.1109\/SFCS.1985.62"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1017\/S0022112079000963","volume":"94","author":"P.R. Fenstermacher","year":"1979","unstructured":"P.R. Fenstermacher, H.L. Swinney, and J.P. Gollub, \u201cDynamical instabilities and the transition to chaotic Taylor vortex flow,\u201d J. Fluid Mech. 94(1) (1979). pp. 103\u2013128.","journal-title":"J. Fluid Mech."},{"key":"13_CR10","series-title":"Monographs in Electrical and Electronic Engineering","volume-title":"Permanent-Magnet and Brushless DC Motors","author":"T. Kenjo","year":"1985","unstructured":"T. Kenjo and S. Nagamori, Permanent-Magnet and Brushless DC Motors, Monographs in Electrical and Electronic Engineering No. 18, Clarendon Press, Oxford, UK, 1985."},{"key":"13_CR11","first-page":"3","volume-title":"Distribution Sampling for Computer Simulation","author":"T.G. Lewis","year":"1975","unstructured":"T.G. Lewis, Distribution Sampling for Computer Simulation, Lexington Books, Lexington, Mass., 1975. p.3."},{"key":"13_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/BFb0038178","volume-title":"Crypto\u2019 90 Conference Proceedings","author":"U. Maurer","year":"1991","unstructured":"U. Maurer, \u201cA universal statistical test for random bit generators,\u201d Crypto\u2019 90 Conference Proceedings, Springer-Verlag Lecture Notes in Computer Science 537, New York, 1991. pp. 408\u2013420."},{"key":"13_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/0-387-34799-2_14","volume-title":"Crypto\u2019 88 Conference Proceedings","author":"S. Micali","year":"1990","unstructured":"S. Micali, and C.P. Schnorr, \u201cEfficient, perfect random number generators,\u201d Crypto\u2019 88 Conference Proceedings, Springer-Verlag Lecture Notes in Computer Science 403, New York, 1990. pp. 173\u2013198."},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF01940759","volume":"64","author":"S. Newhouse","year":"1978","unstructured":"S. Newhouse, D. Ruelle, and F. Takens, \u201cOccurence of strange Axiom A attractors near quasi-periodic flows of T m m \u2265 3,\u201d Commun. Math. Phys. 64 (1978), pp. 35\u201340.","journal-title":"Commun. Math. Phys."},{"key":"13_CR15","volume-title":"Elements of Differentiable Dynamics and Bifurcation Theory","author":"D. Ruelle","year":"1989","unstructured":"D. Ruelle, Elements of Differentiable Dynamics and Bifurcation Theory, Academic Press, San Diego, 1989."},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0022-0000(86)90044-9","volume":"33","author":"M. Santha","year":"1986","unstructured":"M. Santha and U.V. Vazirani, \u201cGenerating quasi-random sequences from semi-random sources,\u201d J. Comput. System Sci., 33 (1986). pp. 75\u201387.","journal-title":"J. Comput. System Sci."},{"key":"13_CR17","first-page":"370","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1994","unstructured":"B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C; Wiley, New York, 1994. p. 370."},{"key":"13_CR18","first-page":"100","volume-title":"An Introduction to Direct-Access Storage Devices","author":"H. Sierra","year":"1990","unstructured":"H. Sierra, An Introduction to Direct-Access Storage Devices, Academic Press, Boston, Mass., 1990. pp. 100\u2013106."},{"key":"13_CR19","unstructured":"Brian Tanner, personal communication."},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"R. Temam, Infinite-dimensional dynamical systems in mechanics and physics, Springer-Verlag Applied Mathematical Sciences 68, 1988, pp. 389\u201392.","DOI":"10.1007\/978-1-4684-0313-8"},{"issue":"4","key":"13_CR21","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/33.16701","volume":"11","author":"D.F. Torok","year":"1988","unstructured":"D.F. Torok and R. Gronseth, \u201cFlow and thermal fields in channels between corotating disks,\u201d IEEE Trans. on Components, Hybrids, and Manuf. Tech., 11(4) (Dec. 1988). pp. 585\u2013593.","journal-title":"IEEE Trans. on Components, Hybrids, and Manuf. Tech."},{"key":"13_CR22","unstructured":"U. Vazirani, \u201cTowards a strong communication complexity theory, or generating quasi-random sequences from two communicating slightly-random sources,\u201d (extended abstract, undated)."},{"key":"13_CR23","unstructured":"J. von Neumann, \u201cVarious techniques used in connection with random digits,\u201d Notes by G.E. Forsythe, National Bureau of Standards, Applied Math Series, Vol. 12, pp. 36\u201338, Reprinted in von Neumann\u2019s Collected Works, Vol. 5, Pergamon Press (1963). pp. 768\u2013770."},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"A.C. Yao, \u201cTheory and applications of trapdoor functions,\u201d Proc. 23rd IEEE Symp. on Foundations of Computer Science, 1982. pp. 80\u201391.","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:03:25Z","timestamp":1737356605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_13","relation":{},"subject":[]}}