{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:11:05Z","timestamp":1778609465269,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540642657","type":"print"},{"value":"9783540697107","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_12","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"168-188","source":"Crossref","is-referenced-by-count":134,"title":["Cryptanalytic Attacks on Pseudorandom Number Generators"],"prefix":"10.1007","author":[{"given":"John","family":"Kelsey","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Hall","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"G.B. Agnew, \u201cRandom Source for Cryptographic Systems,\u201d Advances in Cryptology \u2014 EUROCRYPT\u2019 87 Proceedings, Springer-Verlag, 1988, pp. 77\u201381.","DOI":"10.1007\/3-540-39118-5_8"},{"key":"12_CR2","unstructured":"ANSI X 9.17 (Revised), \u201cAmerican National Standard for Financial Institution Key Management (Wholesale),\u201d American Bankers Association, 1985."},{"key":"12_CR3","unstructured":"R.W. Baldwin, \u201cProper Initialization for the BSAFE Random Number Generator,\u201d RSA Laboratories Bulletin, n. 3, 25 Jan 1996."},{"key":"12_CR4","unstructured":"W. Dai, Crypto++ library, http:\/\/www.eskimo.com\/~weidai\/cryptlib.html ."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"D. Davis, R. Ihaka, and P. Fenstermacher, \u201cCryptographic Randomness from Air Turbulience in Disk Drives,\u201d Advances in Cryptology \u2014 CRYPTO\u2019 94 Proceedings, Springer-Verlag, 1994, pp. 114\u2013120.","DOI":"10.1007\/3-540-48658-5_13"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"D. Eastlake, S.D. Crocker, and J.I. Schiller, \u201cRandomness Requirements for Security,\u201d RFC 1750, Internet Engineering Task Force, Dec. 1994.","DOI":"10.17487\/rfc1750"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"R.C. Fairchild, R.L. Mortenson, and K.B. Koulthart, \u201cAn LSI Random Number Generator (RNG),\u201d Advances in Cryptology: Proceedings of CRYPTO\u2019 84, Springer-Verlag, 1985, pp. 203\u2013230.","DOI":"10.1007\/3-540-39568-7_18"},{"key":"12_CR8","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1515\/FREQ.1985.39.7-8.187","volume":"39","author":"M. Gude","year":"1985","unstructured":"M. Gude, \u201cConcept for a High-Performance Random Number Generator Based on Physical Random Noise,\u201d Frequenz, v. 39, 1985, pp. 187\u2013190.","journal-title":"Frequenz"},{"key":"12_CR9","unstructured":"P. Gutmann, \u201cSoftware Generation of Random Numbers for Cryptographic Purposes,\u201d Proceedings of the 1998 Usenix Security Symposium, 1998, to appear."},{"key":"12_CR10","unstructured":"P. Kocher, post to sci.crypt Internet newsgroup (message-IDpckDIr4Ar.L4z@netcom.com), 4 Dec 1995."},{"key":"12_CR11","unstructured":"J.B. Lacy, D.P. Mitchell, and W.M. Schell, \u201cCryptoLib: Cryptography in Software,\u201d USENIX Security Symposium IV Proceedings, USENIX Association, 1993, pp. 237\u2013246."},{"key":"12_CR12","unstructured":"National Institute for Standards and Technology, \u201cKey Management Using X9.17,\u201d NIST FIPS PUB 171, U.S. Department of Commerce, 1992."},{"key":"12_CR13","unstructured":"National Institute for Standards and Technology, \u201cSecure Hash Standard,\u201d NIST FIPS PUB 180, U.S. Department of Commerce, 1993."},{"key":"12_CR14","unstructured":"National Institute for Standards and Technology, \u201cDigital Signature Standard,\u201d NIST FIPS PUB 186, U.S. Department of Commerce, 1994."},{"key":"12_CR15","volume-title":"2nd ACM Conf. on Computer and Communications Security","author":"P.C. Oorschot van","year":"1994","unstructured":"P.C. van Oorschot and M.J. Wiener, \u201cParallel collision search with application to hash function and discrete logarithms,\u201d 2nd ACM Conf. on Computer and Communications Security, New York, NY, ACM, 1994."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"P.C. van Oorschot and M.J. Wiener, \u201cImproving implementable meet-in-the-middle attacks by orders of magnitude,\u201d CRYPTO\u2019 96, Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_18"},{"issue":"13","key":"12_CR17","first-page":"113","volume":"19","author":"C. Plumb","year":"1994","unstructured":"C. Plumb, \u201cTruly Random Numbers, Dr. Dobbs Journal, v. 19, n. 13, Nov 1994, pp. 113\u2013115.","journal-title":"Dr. Dobbs Journal"},{"key":"12_CR18","unstructured":"M. Richterm \u201cEin Rauschgenerator zur Gweinnung won quasi-idealen Zufallszahlen fur die stochastische Simulation,\u201d Ph.D. dissertation, Aachen University of Technology, 1992. (In German.)"},{"key":"12_CR19","unstructured":"RSA Laboratories, RSAREF cryptographic library, Mar 1994, ftp:\/\/ftp.funet.fi\/pub\/crypt\/cryptography\/asymmetric\/rsa\/rsaref2.tar.gz ."},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0022-0000(86)90044-9","volume":"33","author":"M. Santha","year":"1986","unstructured":"M. Santha and U.V. Vazirani, \u201cGenerating Quasi-Random Sequences from Slightly Random Sources,\u201d Journal of Computer and System Sciences, v. 33, 1986, pp. 75\u201387.","journal-title":"Journal of Computer and System Sciences"},{"key":"12_CR21","unstructured":"B. Schneier, Applied Cryptrography, John Wiley & Sons, 1996."},{"key":"12_CR22","unstructured":"P. Zimmermann, The Official PGP User\u2019s Guide, MIT Press, 1995."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:59:18Z","timestamp":1556733558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1998]]}}}