{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:36:05Z","timestamp":1743086165159,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_54","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:19:11Z","timestamp":1512645551000},"page":"860-876","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0033-6706","authenticated-orcid":false,"given":"Hooman","family":"Alavizadeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0344-4494","authenticated-orcid":false,"given":"Hootan","family":"Alavizadeh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2829-8481","authenticated-orcid":false,"given":"Kudakwashe","family":"Dube","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2605-187X","authenticated-orcid":false,"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1002-057X","authenticated-orcid":false,"given":"Julian","family":"Jang-Jaccard","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8160-5946","authenticated-orcid":false,"given":"Hans W.","family":"Guesgen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"issue":"7","key":"54_CR1","first-page":"290","volume":"6","author":"R Agarwal","year":"2016","unstructured":"Agarwal, R., Agarwal, G.: An efficient method of generating random numbers from congruence equations for cryptographic applications. Int. J. Sci. Eng. Comput. Technol. 6(7), 290 (2016)","journal-title":"Int. J. Sci. Eng. Comput. Technol."},{"key":"54_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-981-10-5421-1_8","volume-title":"Applications and Techniques in Information Security","author":"SU Bazai","year":"2017","unstructured":"Bazai, S.U., Jang-Jaccard, J., Zhang, X.: A privacy preserving platform for MapReduce. In: Batten, L., Kim, D.S., Zhang, X., Li, G. (eds.) ATIS 2017. CCIS, vol. 719, pp. 88\u201399. Springer, Singapore (2017). \n                      https:\/\/doi.org\/10.1007\/978-981-10-5421-1_8"},{"key":"54_CR3","unstructured":"Bhaskar, P., Gawande, P.: A survey on implementation of random number generator in FPGA. Int. J. Sci. Res. (IJSR) 1590\u20131592 (2013)"},{"issue":"4","key":"54_CR4","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M Blum","year":"1984","unstructured":"Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput. 13(4), 850\u2013864 (1984)","journal-title":"SIAM J. Comput."},{"issue":"2","key":"54_CR5","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1109\/TSP.2004.839924","volume":"53","author":"S Callegari","year":"2005","unstructured":"Callegari, S., Rovatti, R., Setti, G.: Embeddable ADC-based true random number generator for cryptographic applications exploiting nonlinear signal processing and chaos. IEEE Trans. Signal Process. 53(2), 793\u2013805 (2005)","journal-title":"IEEE Trans. Signal Process."},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Chefranov, A., Abhari, S.M.A., Alavizadeh, H., Zanjani, M.F.: Secure true random number generator in WLAN\/LAN. In: Proceedings of the 6th International Conference on Security of Information and Networks, pp. 331\u2013335. ACM (2013)","DOI":"10.1145\/2523514.2527098"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Francillon, A., Castelluccia, C.: Tinyrng: A cryptographic random number generator for wireless sensors network nodes. In: 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, WiOpt 2007, pp. 1\u20137. IEEE (2007)","DOI":"10.1109\/WIOPT.2007.4480051"},{"key":"54_CR8","unstructured":"Kozierski, P., Lis, M., Kr\u00f3likowski, A.: Parallel uniform random number generator in FPGA. Comput. Appl. Electr. Eng. 12 (2014)"},{"key":"54_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.matcom.2016.05.005","volume":"135","author":"P LEcuyer","year":"2017","unstructured":"LEcuyer, P., Munger, D., Oreshkin, B., Simard, R.: Random numbers for parallel computers: requirements and methods, with emphasis on GPUs. Math. Comput. Simul. 135, 3\u201317 (2017)","journal-title":"Math. Comput. Simul."},{"key":"54_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-35267-6_34","volume-title":"Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity","author":"J-H Lee","year":"2012","unstructured":"Lee, J.-H., Jeon, M.-J., Kim, S.C.: Uniform random number generator using leap-ahead LFSR architecture. In: Kim, T., Ramos, C., Kim, H., Kiumi, A., Mohammed, S., \u015al\u0119zak, D. (eds.) ASEA 2012. CCIS, vol. 340, pp. 264\u2013271. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-35267-6_34"},{"issue":"15","key":"54_CR11","doi-asserted-by":"publisher","first-page":"3842","DOI":"10.1002\/cpe.3311","volume":"27","author":"G Lo Re","year":"2015","unstructured":"Lo Re, G., Milazzo, F., Ortolani, M.: Secure random number generation in wireless sensor networks. Concurrency Comput. Pract. Experience 27(15), 3842\u20133862 (2015)","journal-title":"Concurrency Comput. Pract. Experience"},{"key":"54_CR12","unstructured":"Noll, L.C., Mende, R.G., Sisodiya, S.: Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system. US Patent 5,732,138, 24 March 1998"},{"issue":"12","key":"54_CR13","doi-asserted-by":"publisher","first-page":"3124","DOI":"10.1109\/TCSI.2010.2052515","volume":"57","author":"F Pareschi","year":"2010","unstructured":"Pareschi, F., Setti, G., Rovatti, R.: Implementation and testing of high-speed cmos true random number generators based on chaotic systems. IEEE Trans. Circuits Syst. I Regul. Pap. 57(12), 3124\u20133137 (2010)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"54_CR14","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Barker, E., Leigh, S., Levenson, M., Banks, D., Heckert, A., Dray, J., Vo, S., et al.: Statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication (2010)"},{"issue":"2","key":"54_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s12518-015-0166-z","volume":"8","author":"D Sathyamorthy","year":"2016","unstructured":"Sathyamorthy, D., Shafii, S., Amin, Z.F.M., Jusoh, A., Ali, S.Z.: Evaluation of the trade-off between global positioning system (GPS) accuracy and power saving from reduction of number of GPS receiver channels. Appl. Geomatics 8(2), 67\u201375 (2016)","journal-title":"Appl. Geomatics"},{"key":"54_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45311-3_30","volume-title":"Progress in Cryptology \u2014 INDOCRYPT 2001","author":"L Shujun","year":"2001","unstructured":"Shujun, L., Xuanqin, M., Yuanlong, C.: Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. In: Rangan, C.P., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 316\u2013329. Springer, Heidelberg (2001). \n                      https:\/\/doi.org\/10.1007\/3-540-45311-3_30"},{"issue":"4","key":"54_CR17","first-page":"595","volume":"47","author":"A Stefanov","year":"2000","unstructured":"Stefanov, A., Gisin, N., Guinnard, O., Guinnard, L., Zbinden, H.: Optical quantum random number generator. J. Mod. Opt. 47(4), 595\u2013598 (2000)","journal-title":"J. Mod. Opt."},{"key":"54_CR18","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.373"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T03:04:19Z","timestamp":1558321459000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"8 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ispec2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}