{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:57:01Z","timestamp":1770224221952,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030017033","type":"print"},{"value":"9783030017040","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_13","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T16:02:50Z","timestamp":1546012970000},"page":"231-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Neural Network Based Min-entropy Estimation for Random Number Generators"],"prefix":"10.1007","author":[{"given":"Jing","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shuangyi","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Na","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"issue":"8","key":"13_CR1","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TIFS.2013.2271423","volume":"8","author":"T Amaki","year":"2013","unstructured":"Amaki, T., Hashimoto, M., Mitsuyama, Y., Onoye, T.: A worst-case-aware design methodology for noise-tolerant oscillator-based true random number generator with stochastic behavior modeling. IEEE Trans. Inf. Forensics Secur. 8(8), 1331\u20131342 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1016\/j.neucom.2015.10.036","volume":"174","author":"S Aras","year":"2016","unstructured":"Aras, S., Kocako\u00e7, I.D.: A new model selection strategy in time series forecasting with artificial neural networks: IHTS. Neurocomputing 174, 974\u2013987 (2016). https:\/\/doi.org\/10.1016\/j.neucom.2015.10.036","journal-title":"Neurocomputing"},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/s00145-010-9089-3","volume":"24","author":"M Baudet","year":"2011","unstructured":"Baudet, M., Lubicz, D., Micolod, J., Tassiaux, A.: On the security of oscillator-based random number generators. J. Cryptol. 24(2), 398\u2013425 (2011)","journal-title":"J. Cryptol."},{"issue":"13\u201315","key":"13_CR4","doi-asserted-by":"publisher","first-page":"2342","DOI":"10.1016\/j.neucom.2005.12.138","volume":"70","author":"X Cai","year":"2007","unstructured":"Cai, X., Zhang, N., Venayagamoorthy, G.K., Wunsch II, D.C.: Time series prediction with recurrent neural networks trained by a hybrid PSO-EA algorithm. Neurocomputing 70(13\u201315), 2342\u20132353 (2007). https:\/\/doi.org\/10.1016\/j.neucom.2005.12.138","journal-title":"Neurocomputing"},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00521-011-0741-0","volume":"22","author":"JP Donate","year":"2013","unstructured":"Donate, J.P., Li, X., S\u00e1nchez, G.G., de Miguel, A.S.: Time series forecasting by evolving artificial neural networks with genetic algorithms, differential evolution and estimation of distribution algorithm. Neural Comput. Appl. 22(1), 11\u201320 (2013). https:\/\/doi.org\/10.1007\/s00521-011-0741-0","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"10:1","DOI":"10.1145\/1609956.1609966","volume":"13","author":"L Dorrendorf","year":"2009","unstructured":"Dorrendorf, L., Gutterman, Z., Pinkas, B.: Cryptanalysis of the random number generator of the windows operating system. ACM Trans. Inf. Syst. Secur. 13(1), 10:1\u201310:32 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"10","key":"13_CR7","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/TC.2006.164","volume":"55","author":"JD Golic","year":"2006","unstructured":"Golic, J.D.: New methods for digital generation and postprocessing of random data. IEEE Trans. Comput. 55(10), 1217\u20131229 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR8","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016). http:\/\/www.deeplearningbook.org"},{"issue":"4","key":"13_CR9","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/0925-2312(91)90040-I","volume":"3","author":"C Groot de","year":"1991","unstructured":"de Groot, C., W\u00fcrtz, D.: Analysis of univariate time series with connectionist nets: a case study of two classical examples. Neurocomputing 3(4), 177\u2013192 (1991). https:\/\/doi.org\/10.1016\/0925-2312(91)90040-I","journal-title":"Neurocomputing"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Gutterman, Z., Pinkas, B., Reinman, T.: Analysis of the linux random number generator. In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21\u201324 May 2006, Berkeley, California, USA, pp. 371\u2013385 (2006)","DOI":"10.1109\/SP.2006.5"},{"key":"13_CR11","unstructured":"Hagerty, P., Draper, T.: Entropy bounds and statistical tests. https:\/\/csrc.nist.gov\/csrc\/media\/events\/random-bit-generation-workshop-2012\/documents\/hagerty_entropy_paper.pdf"},{"key":"13_CR12","unstructured":"ISO\/IEC JTC 1\/SC 27, Berlin, Germany: ISO\/IEC 18031: Information technology - Security techniques - Random bit generation (2011)"},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.asoc.2006.03.002","volume":"7","author":"A Jain","year":"2007","unstructured":"Jain, A., Kumar, A.M.: Hybrid neural network models for hydrologic time series forecasting. Appl. Soft Comput. 7(2), 585\u2013592 (2007). https:\/\/doi.org\/10.1016\/j.asoc.2006.03.002","journal-title":"Appl. Soft Comput."},{"issue":"16\u201318","key":"13_CR14","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1016\/j.neucom.2008.01.030","volume":"71","author":"JMP Menezes Jr","year":"2008","unstructured":"Menezes Jr., J.M.P., Barreto, G.A.: Long-term time series prediction with the NARX network: an empirical evaluation. Neurocomputing 71(16\u201318), 3335\u20133343 (2008). https:\/\/doi.org\/10.1016\/j.neucom.2008.01.030","journal-title":"Neurocomputing"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-662-48324-4_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"J Kelsey","year":"2015","unstructured":"Kelsey, J., McKay, K.A., S\u00f6nmez Turan, M.: Predictive models for min-entropy estimation. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 373\u2013392. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_19"},{"key":"13_CR16","unstructured":"Killmann, W., Schindler, W.: AIS 31: Functionality Classes and Evaluation Methodology for True (Physical) Random Number Generators. Version 3.1. T-Systems GEI GmbH and Bundesamt fr Sicherheit in der Informationstechnik (BSI), Bonn, Germany (2001)"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-85053-3_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"W Killmann","year":"2008","unstructured":"Killmann, W., Schindler, W.: A design for a physical RNG with robust entropy estimators. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 146\u2013163. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_10"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Luna-Sanchez, J.C., G\u00f3mez-Ram\u00edrez, E., Najim, K., Ikonen, E.: Forecasting time series with a logarithmic model for the polynomial artificial neural networks. In: The 2011 International Joint Conference on Neural Networks, IJCNN 2011, San Jose, California, USA, 31 July\u20135 August 2011, pp. 2725\u20132732 (2011). https:\/\/doi.org\/10.1109\/IJCNN.2011.6033576","DOI":"10.1109\/IJCNN.2011.6033576"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-662-44709-3_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"Y Ma","year":"2014","unstructured":"Ma, Y., Lin, J., Chen, T., Xu, C., Liu, Z., Jing, J.: Entropy evaluation for oscillator-based true random number generators. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 544\u2013561. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_30"},{"key":"13_CR20","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"13_CR21","unstructured":"NIST: The NIST Statistical Test Suite (2010). http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documents\/sts-2.1.2.zip"},{"key":"13_CR22","unstructured":"Turan, M.S., Barker, E., Kelsey, J., McKay, K., Baish, M., Boyle, M.: (Second Draft) NIST special publication 800-90B: recommendation for the entropy sources used for random bit generation, January 2016. https:\/\/csrc.nist.gov\/CSRC\/media\/Publications\/sp\/800-90b\/draft\/documents\/sp800-90b_second_draft.pdf"},{"key":"13_CR23","unstructured":"Vanhoef, M., Piessens, F.: Predicting, decrypting, and abusing WPA2\/802.11 group keys. In: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 10\u201312 August 2016, pp. 673\u2013688 (2016)"},{"issue":"1","key":"13_CR24","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TCSI.2013.2265952","volume":"61\u2013I","author":"PZ Wieczorek","year":"2014","unstructured":"Wieczorek, P.Z., Golofit, K.: Dual-metastability time-competitive true random number generator. IEEE Trans. Circuits Syst. 61\u2013I(1), 134\u2013145 (2014). https:\/\/doi.org\/10.1109\/TCSI.2013.2265952","journal-title":"IEEE Trans. Circuits Syst."},{"key":"13_CR25","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/978-3-319-59608-2_38","volume-title":"Security and Privacy in Communication Networks","author":"J Yang","year":"2017","unstructured":"Yang, J., Ma, Y., Chen, T., Lin, J., Jing, J.: Extracting more entropy for TRNGs based on coherent sampling. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds.) SecureComm 2016. LNICSSITE, vol. 198, pp. 694\u2013709. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59608-2_38"},{"issue":"3","key":"13_CR26","doi-asserted-by":"crossref","first-page":"151","DOI":"10.46586\/tosc.v2017.i3.151-168","volume":"2017","author":"S Zhu","year":"2017","unstructured":"Zhu, S., Ma, Y., Chen, T., Lin, J., Jing, J.: Analysis and improvement of entropy estimators in NIST SP 800-90B for Non-IID entropy sources. IACR Trans. Symmetric Cryptol. 2017(3), 151\u2013168 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-662-53887-6_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"Shuangyi Zhu","year":"2016","unstructured":"Zhu, S., Ma, Y., Lin, J., Zhuang, J., Jing, J.: More powerful and reliable second-level statistical randomness tests for NIST SP 800-22. In: Proceedings Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4\u20138 December 2016, Part I, pp. 307\u2013329 (2016)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T22:27:56Z","timestamp":1605911276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}