{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:03:36Z","timestamp":1742990616705,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319638584"},{"type":"electronic","value":"9783319638591"}],"license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-63859-1_45","type":"book-chapter","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T03:54:54Z","timestamp":1500263694000},"page":"370-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of a Random Number Generator Based on a Chaotic Circuit"],"prefix":"10.1007","author":[{"given":"Salih","family":"Erg\u00fcn","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"key":"45_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptology","author":"A Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptology. CRC Press, Boca Raton (1996)"},{"issue":"5","key":"45_CR2","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TCSI.2010.2089561","volume":"58","author":"NC G\u00f6v","year":"2011","unstructured":"G\u00f6v, N.C., M\u0131h\u00e7ak, M.K., Erg\u00fcn, S.: True random number generation via sampling from flat band-limited Gaussian processes. IEEE Trans. Circ. Syst. I 58(5), 1044\u20131051 (2011)","journal-title":"IEEE Trans. Circ. Syst. I"},{"issue":"5","key":"45_CR3","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/81.847868","volume":"47","author":"CS Petrie","year":"2000","unstructured":"Petrie, C.S., Connelly, J.A.: A noise-based IC random number generator for applications in cryptography. IEEE Trans. Circ. Syst. I 47(5), 615\u2013621 (2000)","journal-title":"IEEE Trans. Circ. Syst. I"},{"key":"45_CR4","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TC.2003.1190581","volume":"52","author":"M Bucci","year":"2003","unstructured":"Bucci, M., Germani, L., Luzzi, R., Trifiletti, A., Varanonuovo, M.: A high speed oscillator-based truly random number source for cryptographic applications on a smart card IC. IEEE Trans. Comput. 52, 403\u2013409 (2003)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"45_CR5","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1109\/81.915396","volume":"48","author":"T Stojanovski","year":"2001","unstructured":"Stojanovski, T., Pihl, J., Kocarev, L.: Chaos-based random number generators-part II: practical realization. IEEE Trans. Circ. Syst. I 48(3), 382\u2013385 (2001)","journal-title":"IEEE Trans. Circ. Syst. I"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"\u00c7icek, \u0130., D\u00fcndar, G.: A chaos based integrated jitter booster circuit for true random number generators. In: Proceedings of the European Conference Circuit Theory and Design (ECCTD 2013), pp. 1\u20134, August 2013","DOI":"10.1109\/ECCTD.2013.6662257"},{"key":"45_CR7","unstructured":"\u00c7icek, \u0130.: Design aspects of discrete time chaos based true random number generators, Ph.D. thesis. \n                    http:\/\/www.ee.boun.edu.tr\/Research\/RecentPhDDisserta-tions.aspx"},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1587\/transfun.E94.A.180","volume":"E94\u2013A","author":"S Erg\u00fcn","year":"2011","unstructured":"Erg\u00fcn, S., G\u00fcler, \u00dc., Asada, K.: A high speed IC truly random number generator based on chaotic sampling of regular waveform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E94\u2013A(1), 180\u2013190 (2011)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"45_CR9","unstructured":"National Institute of Standard and Technology: A Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications, NIST 800-22, May 2001. \n                    http:\/\/csrc.nist.gov\/rng\/SP800-22b.pdf"},{"key":"45_CR10","unstructured":"L\u2019Ecuyer, P.: Universit\u2019e de Montr\u2019eal: Empirical Testing of Random Number Generators (2002). \n                    http:\/\/www.iro.umontreal.ca\/~lecuyer\/"},{"key":"45_CR11","unstructured":"Marsalgia, G.: Diehard: A Battery of Tests of Randomness (1997). \n                    http:\/\/stat.fsu.edu\/~geo\/diehard.htm"},{"issue":"8","key":"45_CR12","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"LM Pecora","year":"1990","unstructured":"Pecora, L.M., Carroll, T.L.: Synchronization in chaotic systems. Phys. Rev. Lett. 64(8), 821\u2013824 (1990)","journal-title":"Phys. Rev. Lett."},{"key":"45_CR13","unstructured":"Hasler, M.: Synchronization principles and applications. In: Toumazou, C. (ed.) Tutorials IEEE International Symposium on Circuits and Systems (ISCAS 1994), London, England, pp. 314\u2013327 (1994)"}],"container-title":["Smart Innovation, Systems and Technologies","Advances in Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63859-1_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T08:01:37Z","timestamp":1557993697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63859-1_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"ISBN":["9783319638584","9783319638591"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63859-1_45","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"18 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IIH-MSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iih2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bit.kuas.edu.tw\/~iihmsp17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}