{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:57:00Z","timestamp":1743011820825,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":20,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_514","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:14Z","timestamp":1319723414000},"page":"1022-1026","source":"Crossref","is-referenced-by-count":0,"title":["Random Bit Generator"],"prefix":"10.1007","author":[{"given":"Marco","family":"Bucci","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"514_CR1_514","doi-asserted-by":"crossref","unstructured":"Bagini V, Bucci M (1999) A design of reliable true random number generator for cryptographic applications. In: Ko\u00e7 \u00c7K, Paar C (eds) Proceedings of workshop cryptographic hardware and embedded systems, CHES \u201999, Worcester. Lecture Notes in Computer Science, vol 1717. Springer, Berlin, pp 204\u2013218","DOI":"10.1007\/3-540-48059-5_18"},{"key":"514_CR2_514","volume-title":"Principles and applications of random noise theory","author":"JS Bendat","year":"1958","unstructured":"Bendat JS (1958) Principles and applications of random noise theory. Wiley, New\u00a0York"},{"key":"514_CR3_514","doi-asserted-by":"crossref","unstructured":"Davis D, Ihaka R, Philip F (1994) Cryptographic randomness from air turbulence in disk drives. In: Desmedt Y (ed) Advances in cryptology\u00a0\u2013 CRYPTO\u201994. Lecture Notes in Computer Science, vol 839. Springer, Heidelberg, pp 114\u2013120","DOI":"10.1007\/3-540-48658-5_13"},{"key":"514_CR4_514","unstructured":"Dichtl M, Janssen N (2000) A high quality physical random number generator. In: Proceedings of Sophia Antipolis forum microelectronics (SAME 2000), Sophia-Antipolis, pp 48\u201353"},{"key":"514_CR5_514","unstructured":"FIPS 140-1 (1994) Security requirements for cryptographic modules. National Institute of Standards and Technology, GPO, Washington,\u00a0DC"},{"issue":"7\u20138","key":"514_CR6_514","first-page":"187","volume":"39","author":"M Gude","year":"1985","unstructured":"Gude M (1985) Concepts for a high performance random number generator based on physical random phenomena. Frequenz 39(7\u20138):187\u2013190","journal-title":"Frequenz"},{"issue":"6","key":"514_CR7_514","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/81.586025","volume":"44","author":"WT Holman","year":"1997","unstructured":"Holman WT, Connelly JA, Downlatabadi AB (1997) An integrated analog\/digital random noise source. IEEE Trans Circuits Syst I 44(6):521\u2013528","journal-title":"IEEE Trans Circuits Syst I"},{"key":"514_CR8_514","unstructured":"Jun B, Kocher P (1999) The Intel random number generator. Cryptography Research Inc., white paper prepared for Inter Corp. \n                  http:\/\/www.cryptography.com\/resources\/whitepapers\/Inte-lRNG.pdf"},{"key":"514_CR9_514","volume-title":"The art of computer programming","author":"DE Knuth","year":"1981","unstructured":"Knuth DE (1981) The art of computer programming, 2nd edn. Addison-Wesley, Reading","edition":"2"},{"issue":"8","key":"514_CR10_514","first-page":"542","volume":"E5","author":"RS Maddocks","year":"1972","unstructured":"Maddocks RS, Matthews S, Walker EW, Vincent CH (1972) A compact and accurate generator for truly random binary digits. J Phys E5(8):542\u2013544","journal-title":"J Phys"},{"key":"514_CR11_514","volume-title":"Handbook of applied cryptology","author":"AJ Memezes","year":"2001","unstructured":"Memezes AJ, Oorschot PC, Vanstone SA (2001) Handbook of applied cryptology. CRC, Boca\u00a0Raton"},{"key":"514_CR12_514","doi-asserted-by":"crossref","unstructured":"Murry HF (1970) A general approach for generating natural random variables. IEEE Trans Comput C-19:1210\u20131213","DOI":"10.1109\/T-C.1970.222860"},{"key":"514_CR13_514","volume-title":"Probability, random variables and stochastic processes","author":"A Papoulis","year":"1965","unstructured":"Papoulis A (1965) Probability, random variables and stochastic processes. McGraw-Hill, New\u00a0York"},{"key":"514_CR14_514","unstructured":"Petrie CA (1997) An integrated random bit generator for applications in cryptography. PhD thesis, Georgia Institute of Technology, Atlanta"},{"key":"514_CR15_514","unstructured":"Petrie CS, Connelly JA (1996) Modeling and simulation of oscillator-based random number generators. In: Proceedings of IEEE international symposium on circuits and systems, ISCAS\u201996, vol 4. IEEE, Atlanta, pp 324\u2013327"},{"issue":"5","key":"514_CR16_514","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1109\/81.847868","volume":"47","author":"CS Petrie","year":"2000","unstructured":"Petrie CS, Connelly JA (2000) A noise-based IC random number generator for applications in cryptography. IEEE Trans Circuits Syst I 47(5):615\u2013621","journal-title":"IEEE Trans Circuits Syst I"},{"key":"514_CR17_514","volume-title":"Applied cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B (1996) Applied cryptography, 2nd ed. Wiley, New\u00a0York","edition":"2"},{"issue":"6","key":"514_CR18_514","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/40.977755","volume":"21","author":"E Trichina","year":"2001","unstructured":"Trichina E, Bucci M, De Seta D, Luzzi R (2001) Supplementary cryptographic hardware for smart cards. IEEE Micro 21(6): 26\u201335","journal-title":"IEEE Micro"},{"issue":"8","key":"514_CR19_514","first-page":"594","volume":"E3","author":"CH Vincent","year":"1970","unstructured":"Vincent CH (1970) The generation of truly random binary numbers. J Phys E3(8):594\u2013598","journal-title":"J Phys"},{"issue":"11","key":"514_CR20_514","first-page":"825","volume":"E4","author":"CH Vincent","year":"1971","unstructured":"Vincent CH (1971) Precautions for the accuracy in the generation of truly random binary numbers. J Phys E4(11): 825\u2013828","journal-title":"J Phys"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:09:39Z","timestamp":1591056579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_514"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_514","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}