{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:01Z","timestamp":1740099181665,"version":"3.37.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030047610"},{"type":"electronic","value":"9783030047627"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04762-7_8","type":"book-chapter","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T05:13:48Z","timestamp":1542690828000},"page":"143-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Great Expectations: A Critique of Current Approaches to Random Number Generation Testing &amp; Certification"],"prefix":"10.1007","author":[{"given":"Darren","family":"Hurley-Smith","sequence":"first","affiliation":[]},{"given":"Julio","family":"Hernandez-Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,21]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-36400-5_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"W Schindler","year":"2003","unstructured":"Schindler, W., Killmann, W.: Evaluation criteria for true (physical) random number generators used in cryptographic applications. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 431\u2013449. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_31"},{"key":"8_CR2","unstructured":"NXP Semiconductors Ltd. MF1PLUSx0y1 Public Datasheet. NXP Semiconductors, 21 February 2011"},{"key":"8_CR3","unstructured":"NXP Semiconductors Ltd. MF3D(H)x2 MIFARE DESFire EV2 contactless multi-application IC, 2 edn. NXP Semiconductors Ltd., February 2016"},{"key":"8_CR4","unstructured":"Altus Metrum. ChaosKey True Random Number Generator, June 2008"},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v007.i03","volume":"7","author":"G Marsaglia","year":"2002","unstructured":"Marsaglia, G., Tsang, W.W., et al.: Some difficult-to-pass tests of randomness. J. Stat. Softw. 7(3), 1\u20139 (2002)","journal-title":"J. Stat. Softw."},{"key":"8_CR6","unstructured":"National Institute of Standards and Technology. NIST SP800-22 Revision 1a A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-22r1a.pdf . Accessed 21 May 2018"},{"key":"8_CR7","unstructured":"Walker, J.: Ent. A pseudo-random number sequence testing program. https:\/\/www.fourmilab.ch\/random\/ . Accessed 07 Aug 2018"},{"issue":"4","key":"8_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/1268776.1268777","volume":"33","author":"P L\u2019Ecuyer","year":"2007","unstructured":"L\u2019Ecuyer, P., Simard, R.: TestU01: a C library for empirical testing of random number generators. ACM Trans. Math. Softw. (TOMS) 33(4), 22 (2007)","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: Proceedings of 45th Annual IEEE Symposium on Foundations of Computer Science, pp. 196\u2013205. IEEE (2004)","DOI":"10.1109\/FOCS.2004.44"},{"key":"8_CR10","unstructured":"Marsaglia, G.: DIEHARD, a battery of tests for random number generators. CD-ROM, Department of Statistics and Supercomputer Computations Research Institute, Florida State University. http:\/\/stat.fsu.edu\/Ageo"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-62024-4_9","volume-title":"Radio Frequency Identification and IoT Security","author":"D Hurley-Smith","year":"2017","unstructured":"Hurley-Smith, D., Hernandez-Castro, J.: Bias in the mifare DESFire EV1 TRNG. In: Hancke, G.P., Markantonakis, K. (eds.) RFIDSec 2016. LNCS, vol. 10155, pp. 123\u2013133. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62024-4_9"},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1109\/TIFS.2017.2777342","volume":"13","author":"D Hurley-Smith","year":"2018","unstructured":"Hurley-Smith, D., Hernandez-Castro, J.: Certifiably biased: an in-depth analysis of a common criteria EAL4+ certified TRNG. IEEE Trans. Inf. Forensics Secur. 13(4), 1031\u20131041 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-88313-5_7","volume-title":"Computer Security - ESORICS 2008","author":"FD Garcia","year":"2008","unstructured":"Garcia, F.D., et al.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97\u2013114. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88313-5_7"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Garcia, F.D., Van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a Mifare Classic card. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 3\u201315. IEEE (2009)","DOI":"10.1109\/SP.2009.6"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-14577-3_28","volume-title":"Financial Cryptography and Data Security","author":"T Kasper","year":"2010","unstructured":"Kasper, T., Silbermann, M., Paar, C.: All you can eat or breaking a real-world contactless payment system. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 343\u2013350. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_28"},{"key":"8_CR16","unstructured":"Renesas AE45C1 and Smartcard Integrated Circuit. BSI-DSZ-CC-0212-2004 (2004)"},{"key":"8_CR17","unstructured":"Barker, E., Kelsey, J.: Recommendation for the entropy sources used for random bit generation (DRAFT) NIST SP800-90B (2012)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, DTIC Document (2001)","DOI":"10.6028\/NIST.SP.800-22"},{"key":"8_CR19","unstructured":"Rukhin, A., Soto, J., Nechvatal, J.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST DTIC Document. NIST SP800-22 (2010)"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.csi.2006.04.002","volume":"29","author":"D Mellado","year":"2007","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stan. Interfaces 29(2), 244\u2013253 (2007)","journal-title":"Comput. Stan. Interfaces"},{"key":"8_CR21","unstructured":"Killmann, W., Schindler, W.: AIS 31: functionality classes and evaluation methodology for true (physical) random number generators, version 3.1. Bundesamt fur Sicherheit in der Informationstechnik (BSI), Bonn (2001)"},{"key":"8_CR22","unstructured":"Brown, R.G., Eddelbuettel, D., Bauer, D.: Dieharder: a random number test suite. Open Source software library, under development (2013)"},{"issue":"1","key":"8_CR23","first-page":"18","volume":"18","author":"K Marton","year":"2015","unstructured":"Marton, K., Suciu, A.: On the interpretation of results from the NIST statistical test suite. Sci. Technol. 18(1), 18\u201332 (2015)","journal-title":"Sci. Technol."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Hernandez-Castro, J., Barrero, D.F.: Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery. In: 2017 IEEE Congress on Evolutionary Computation (CEC), pp. 1420\u20131427. IEEE (2017)","DOI":"10.1109\/CEC.2017.7969470"},{"key":"8_CR25","unstructured":"Soto, J.: Statistical testing of random number generators. In: Proceedings of the 22nd National Information Systems Security Conference, vol. 10, p. 12. NIST, Gaithersburg (1999)"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-85912-3_2","volume-title":"Sequences and Their Applications - SETA 2008","author":"MS Turan","year":"2008","unstructured":"Turan, M.S., DoG\u0306anaksoy, A., Bozta\u015f, S.: On independence and sensitivity of statistical randomness tests. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol. 5203, pp. 18\u201329. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85912-3_2"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Georgescu, C., Simion, E., Nita, A.-P., Toma, A.: A view on NIST randomness tests (in)dependence. In: 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/ECAI.2017.8166460"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-662-53887-6_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"S Zhu","year":"2016","unstructured":"Zhu, S., Ma, Y., Lin, J., Zhuang, J., Jing, J.: More powerful and reliable second-level statistical randomness tests for NIST SP 800-22. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 307\u2013329. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_11"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-319-05149-9_4","volume-title":"Information Security Applications","author":"L Fan","year":"2014","unstructured":"Fan, L., Chen, H., Gao, S.: A general method to evaluate the correlation of randomness tests. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 52\u201362. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_4"},{"key":"8_CR30","unstructured":"Hurley-Smith, D., Hernandez-Castro, J.: Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators. Cryptology ePrint Archive, Report 2017\/842 (2017). https:\/\/eprint.iacr.org\/2017\/842"},{"key":"8_CR31","unstructured":"National Institute of Standards and Technology. NIST SP800-90B Reccommendation for the Entropy Sources used for Random Bit Generation. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-90B.pdf . Accessed 21 May 2018"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Verbauwhede, I., Maes, R.: Physically unclonable functions: manufacturing variability as an unclonable device identifier. In: Proceedings of the 21st edition of the Great Lakes Symposium on VLSI, pp. 455\u2013460. ACM (2011)","DOI":"10.1145\/1973009.1973111"},{"key":"8_CR33","unstructured":"Altus Metrum. https:\/\/altusmetrum.org . Accessed 11 Sept 2018"},{"issue":"2","key":"8_CR34","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/JSYST.2007.907683","volume":"1","author":"M Langheinrich","year":"2007","unstructured":"Langheinrich, M., Marti, R.: Practical minimalist cryptography for RFID privacy. IEEE Syst. J. 1(2), 115\u2013128 (2007)","journal-title":"IEEE Syst. J."},{"issue":"2","key":"8_CR35","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MSECP.2003.1193210","volume":"99","author":"WE Burr","year":"2003","unstructured":"Burr, W.E.: Selecting the advanced encryption standard. IEEE Secur. Priv. 99(2), 43\u201352 (2003)","journal-title":"IEEE Secur. Priv."}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04762-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T14:11:06Z","timestamp":1572963066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04762-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047610","9783030047627"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04762-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssr2018.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"16","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}