{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:06:27Z","timestamp":1725537987152},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047657"},{"type":"electronic","value":"9783642047664"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04766-4_13","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T09:55:53Z","timestamp":1253008553000},"page":"179-189","source":"Crossref","is-referenced-by-count":15,"title":["Towards True Random Number Generation in Mobile Environments"],"prefix":"10.1007","author":[{"given":"Jan","family":"Bouda","sequence":"first","affiliation":[]},{"given":"Jan","family":"Krhovjak","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Matyas","sequence":"additional","affiliation":[]},{"given":"Petr","family":"Svenda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-45238-6_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"B. Barak","year":"2003","unstructured":"Barak, B., Shaltiel, R., Tromer, E.: True random number generators secure in a changing environment. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 166\u2013180. Springer, Heidelberg (2003)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal hash functions. Journal of Computer and System Sciences\u00a018, 143\u2013144 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"13_CR3","unstructured":"Goldberg, I., Wagner, D.: Randomness and the Netscape Browser. Dr. Dobb\u2019s Journal, Special issue on Encoding: Encryption, Compression, and Error Correction (1996)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Levin, L.A., Luby, M.: Pseudorandom generation from one-way functions. In: Proceeding of the 21st ACM Symposium on Theory of Computing (1989)","DOI":"10.1145\/73007.73009"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Zuckerman, D.: How to recycle random bits. In: Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pp. 248\u2013253 (1989)","DOI":"10.1109\/SFCS.1989.63486"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MC.2007.49","volume":"40","author":"A.N. Klingsheim","year":"2007","unstructured":"Klingsheim, A.N., Moen, V., Hole, K.J.: Challenges in Securing Networked J2ME Applications. Computer\u00a040, 24\u201330 (2007)","journal-title":"Computer"},{"key":"13_CR7","unstructured":"Krhovjak, J., Svenda, P., Matyas, V.: The Sources of Randomness in Mobile Devices. In: Proceeding of the 12th Nordic Workshop on Secure IT Systems, Reykjavik University, pp. 73\u201384 (2007)"},{"key":"13_CR8","unstructured":"Lowe, G.: OpenSSL Security Advisory \u2013 OpenSSL FIPS Object Module Vulnerabilities (2007), http:\/\/www.openssl.org\/news\/secadv_20071129.txt"},{"key":"13_CR9","unstructured":"Bello, L.: Debian Security Advisory \u2013 OpenSSL predictable random number generator (2008), http:\/\/www.debian.org\/security\/2008\/dsa-1571"},{"key":"13_CR10","first-page":"67","volume":"77","author":"R. Shaltiel","year":"2002","unstructured":"Shaltiel, R.: Recent Developments in Explicit Constructions of Extractors. Bulletin of the EATCS\u00a077, 67\u201395 (2002)","journal-title":"Bulletin of the EATCS"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-68697-5_24","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"V. Shoup","year":"1996","unstructured":"Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 313\u2013328. Springer, Heidelberg (1996), http:\/\/www.shoup.net\/papers\/macs.pdf"},{"key":"13_CR12","unstructured":"Simonsen, K.I.F., Moen, V., Hole, K.J.: Attack on Sun\u2019s MIDP Reference Implementation of SSL. In: Proceeding 10th Nordic Workshop on Secure IT Systems, Tartu University, pp. 96\u2013103 (2005)"},{"issue":"4","key":"13_CR13","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1137\/S009753979630091X","volume":"28","author":"A. Srinivasan","year":"1999","unstructured":"Srinivasan, A., Zuckerman, D.: Computing with very weak random sources. SIAM Journal on Computing\u00a028(4), 1433\u20131459 (1999)","journal-title":"SIAM Journal on Computing"}],"container-title":["Lecture Notes in Computer Science","Identity and Privacy in the Internet Age"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04766-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T15:53:02Z","timestamp":1558540382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04766-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047657","9783642047664"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04766-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}