{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:03:28Z","timestamp":1757624608495,"version":"3.44.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032019004"},{"type":"electronic","value":"9783032019011"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-01901-1_15","type":"book-chapter","created":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T08:44:51Z","timestamp":1755333891000},"page":"467-496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Provable Security and\u00a0Efficiency of\u00a0Permutation-Based DRBGs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3793-5291","authenticated-orcid":false,"given":"Woohyuk","family":"Chung","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2166-6421","authenticated-orcid":false,"given":"Seongha","family":"Hwang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3010-5116","authenticated-orcid":false,"given":"Hwigyeom","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5471-9350","authenticated-orcid":false,"given":"Jooyoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,17]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Barak, B., Halevi, S.: A model and architecture for pseudo-random generation with applications to \/dev\/random. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS \u201905, pp. 203\u2013212. Association for Computing Machinery, New York, NY, USA (2005)","DOI":"10.1145\/1102120.1102148"},{"key":"15_CR2","unstructured":"Bertoni, G., et al.: TurboSHAKE. Cryptology ePrint Archive (2023)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-15031-9_3","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"G Bertoni","year":"2010","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge-based pseudo-random number generators. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 33\u201347. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_3"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van\u00a0Assche, G.: Keccak. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 313\u2013314. Springer, Cham (2013)","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-319-93387-0_21","volume-title":"Applied Cryptography and Network Security","author":"G Bertoni","year":"2018","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R., Viguier, B.: KangarooTwelve: fast hashing based on $${Keccak\\text{- }p} $$. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 400\u2013418. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93387-0_21"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Chung, W., Hwang, S., Kim, H., Lee, J.: Enhancing provable security and efficiency of permutation-based DRBGs. Cryptology ePrint Archive, Paper 2025\/951 (2025)","DOI":"10.1007\/978-3-032-01901-1_15"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-981-96-0938-3_15","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"W Chung","year":"2024","unstructured":"Chung, W., Kim, H., Lee, J., Lee, Y.: Provable security of Linux-DRBG in the seedless robustness model. In: Chung, K.M., Sasaki, Y. (eds.) ASIACRYPT 2024. LNCS, vol. 15489, pp. 461\u2013490. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0938-3_15"},{"key":"15_CR8","unstructured":"Chung, W., Kim, H., Lee, J., Lee, Y.: Security analysis of the ISO standard OFB-DRBG. In: Designs, Codes and Cryptography, pp. 1\u201318 (2024)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-030-26948-7_8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"S Coretti","year":"2019","unstructured":"Coretti, S., Dodis, Y., Karthikeyan, H., Tessaro, S.: Seedless fruit is the sweetest: random number generation, revisited. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11692, pp. 205\u2013234. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_8"},{"key":"15_CR10","unstructured":"Daemen, J., Hoffert, S., Mella, S., Assche, G.V.: SHAKE modes of operation (2023)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Pointcheval, D., Ruhault, S., Vergniaud, D., Wichs, D.: Security analysis of pseudo-random number generators with input: \/dev\/random is not robust. IN: CCS \u201913, pp. 647\u2013658. Association for Computing Machinery, New York, NY, USA (2013)","DOI":"10.1145\/2508859.2516653"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.1007\/s00453-016-0239-3","volume":"79","author":"Y Dodis","year":"2017","unstructured":"Dodis, Y., Shamir, A., Stephens-Davidowitz, N., Wichs, D.: How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Algorithmica 79, 1196\u20131232 (2017)","journal-title":"Algorithmica"},{"key":"15_CR13","unstructured":"Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions (2015)"},{"key":"15_CR14","volume-title":"Practical Cryptography","author":"N Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography, vol. 141. Wiley, New York (2003)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Leclerc, P.: Randomness concerns when deploying differential privacy. In: Proceedings of the 19th Workshop on Privacy in the Electronic Society, pp. 73\u201386 (2020)","DOI":"10.1145\/3411497.3420211"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-662-49890-3_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"P Ga\u017ei","year":"2016","unstructured":"Ga\u017ei, P., Tessaro, S.: Provably robust sponge-based prngs and KDFs. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 87\u2013116. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_4"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-030-56784-2_8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"VT Hoang","year":"2020","unstructured":"Hoang, V.T., Shen, Y.: Security analysis of NIST CTR-DRBG. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12170, pp. 218\u2013247. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_8"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-319-69453-5_21","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"D Hutchinson","year":"2017","unstructured":"Hutchinson, D.: A robust and sponge-like PRNG with improved efficiency. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 381\u2013398. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_21"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Ruhault, S.: SoK: security models for pseudo-random number generators. IACR Trans. Symmetr. Cryptol. 506\u2013544 (2017)","DOI":"10.46586\/tosc.v2017.i1.506-544"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-662-46800-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"T Shrimpton","year":"2015","unstructured":"Shrimpton, T., Terashima, R.S.: A provable-security analysis of intel\u2019s secure key RNG. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015, Part I. LNCS, vol. 9056, pp. 77\u2013100. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_4"},{"key":"15_CR21","unstructured":"Turan, M.S., McKay, K., Chang, D., Kang, J., Kelsey, J.: Ascon-based lightweight cryptography standards for constrained devices: authenticated encryption, hash, and extendable output functions. Technical report, National Institute of Standards and Technology (2024)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-17656-3_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"J Woodage","year":"2019","unstructured":"Woodage, J., Shumow, D.: An analysis of NIST SP 800-90A. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11477, pp. 151\u2013180. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17656-3_6"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01901-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T14:57:38Z","timestamp":1757429858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01901-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032019004","9783032019011"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01901-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}