{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:59:25Z","timestamp":1725551965975},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642125096"},{"type":"electronic","value":"9783642125102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_5","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T23:43:16Z","timestamp":1270856596000},"page":"49-64","source":"Crossref","is-referenced-by-count":4,"title":["Designing a Side Channel Resistant Random Number Generator"],"prefix":"10.1007","author":[{"given":"Suresh N.","family":"Chari","sequence":"first","affiliation":[]},{"given":"Vincenzo V.","family":"Diluoffo","sequence":"additional","affiliation":[]},{"given":"Paul A.","family":"Karger","sequence":"additional","affiliation":[]},{"given":"Elaine R.","family":"Palmer","sequence":"additional","affiliation":[]},{"given":"Tal","family":"Rabin","sequence":"additional","affiliation":[]},{"given":"Josyula R.","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Rohotgi","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Scherzer","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Steiner","sequence":"additional","affiliation":[]},{"given":"David C.","family":"Toll","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/3-540-48059-5_18","volume-title":"Cryptographic Hardware and Embedded Systems","author":"V. Bagini","year":"1999","unstructured":"Bagini, V., Bucci, M.: A design of reliable true random number generator for cryptographic applications. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 204\u2013218. Springer, Heidelberg (1999)"},{"key":"5_CR3","unstructured":"Barker, E., Kelsey, J.: Recommendation for random number generation using deterministic random bit generators (revised). NIST SP800-90, National Institute of Standards and Technology, Gaithersburg, MD (March 2007), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-90\/SP800-90revised_March2007.pdf"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"5_CR6","unstructured":"Campbell, J., Easter, R.J.: Annex c: Approved random number generators for FIPS PUB 140-2, security requirements for cryptographic modules. FIPS PUB 140-2, Annex C, National Institute of Standards and Technology, Gaithersburg, MD (Draft of July 31, 2009), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips140-2\/fips1402annexc.pdf"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"5_CR8","unstructured":"Chari, S.N., Diluoffo, V.V., Karger, P.A., Palmer, E.R., Rabin, T., Rao, J.R., Rohatgi, P., Scherzer, H., Steiner, M., Toll, D.C.: Method, apparatus and system for resistence to side channel attacks on random number generators. United States Patent No. 7496616 (Filed November 12, 2004, Issued February 24, 2009)"},{"key":"5_CR9","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 3: Security assurance requirements. Version 2.3 CCMB2005-08-003 (August 2005), \n                    \n                      http:\/\/www.commoncriteriaportal.org\/public\/files\/ccpart3v2.3.pdf"},{"key":"5_CR10","unstructured":"Common Criteria for Information Technology Security Evaluation, Parts 1, 2, and 3. Version 2.3 CCMB2005-08-001, CCMB2005-08-002, and CCMB2005-08-003 (August 2005), \n                    \n                      http:\/\/www.commoncriteriaportal.org\/thecc.html"},{"key":"5_CR11","unstructured":"Digital signature standard. FIPS PUB 186-2, with Change Notice 1, 5 October 2001, National Institute of Standards and Technology, Gaithersburg, MD (January 2000), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/archive\/fips186-2\/fips186-2.pdf"},{"key":"5_CR12","unstructured":"Dole, B.: Distributed state random number generator and method for utilizing same. United States Patent No. US6628786B1, September 30 (2003)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/978-3-540-45238-6_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"M. Epstein","year":"2003","unstructured":"Epstein, M., Hars, L., Krasinski, R., Rosner, M., Zheng, H.: Design and implementation of a true random number generator based on digital circuit artifacts. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 152\u2013165. Springer, Heidelberg (2003)"},{"key":"5_CR14","unstructured":"Functionality classes and evaluation methodology for deterministic random number generators. AIS 20, Version 1, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn, Germany, December 2 (1999), \n                    \n                      http:\/\/www.bsi.bund.de\/zertifiz\/zert\/interpr\/ais20e.pdf"},{"key":"5_CR15","unstructured":"Functionality classes and evaluation methodology for physical random number generators. AIS 31, Version 1, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn, Germany, September 25 (2001), \n                    \n                      http:\/\/www.bsi.bund.de\/zertifiz\/zert\/interpr\/ais31e.pdf"},{"key":"5_CR16","unstructured":"ISO 7816-3, Identification cards - Integrated circuit(s) with contacts - Part 3: Electronic signals and transmission protocols, Second edition. ISO Standard 7816-3, International Standards Organization (December 1997)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/978-3-540-39881-3_4","volume-title":"Security in Pervasive Computing","author":"P.A. Karger","year":"2004","unstructured":"Karger, P.A.: The importance of high-assurance security in pervasive computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, p. 9. Springer, Heidelberg (2004), \n                    \n                      http:\/\/web.archive.org\/web\/20040524183841\/http:\/\/www.dfki.de\/spc2003\/karger.pdf"},{"key":"5_CR18","unstructured":"Karger, P.A., Toll, D.C., McIntosh, S.K.: Processor requirements for a high security smart card operating system. In: Proc. 8th e-Smart Conference. Eurosmart, Sophia Antipolis, France, September 19-21 (2007), Available as IBM Research Division Report RC 24219 (W0703-091), \n                    \n                      http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/Home"},{"key":"5_CR19","unstructured":"Killman, W., Schindler, W.: A proposal for: Functionality classes and evaluation methodology for true (physical) random number generators. Tech. rep., T-Systems debis Systemhaus Information Security Services and Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn, Germany (September 25, 2001), \n                    \n                      http:\/\/www.bsi.bund.de\/zertifiz\/zert\/interpr\/trngk31e.pdf"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","first-page":"143","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis: Leaking Secrets. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 143\u2013161. Springer, Heidelberg (1999)"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-48059-5_19","volume-title":"Cryptographic Hardware and Embedded Systems","author":"D.P. Maher","year":"1999","unstructured":"Maher, D.P., Rance, R.J.: Random number generators founded on signal and information theory. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 219\u2013230. Springer, Heidelberg (1999)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Petit, C., Standaert, F.X., Pereira, O., Malkin, T., Yung, M.: A block cipher based pseudo random number generator secure against side-channel key recovery. In: ASIACCS 2008, Tokyo, Japan, March 18\u201320, pp. 56\u201365 (2008)","DOI":"10.1145\/1368310.1368322"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/10722599_2","volume-title":"Computer Security - ESORICS 2000","author":"G. Schellhorn","year":"2000","unstructured":"Schellhorn, G., Reif, W., Schairer, A., Karger, P., Austel, V., Toll, D.: Verification of a formal security model for multiapplicative smart cards. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 17\u201336. Springer, Heidelberg (2000)"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-39650-5_11","volume-title":"Computer Security \u2013 ESORICS 2003","author":"H. Scherzer","year":"2003","unstructured":"Scherzer, H., Canetti, R., Karger, P.A., Krawczyk, H., Rabin, T., Toll, D.C.: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 181\u2013200. Springer, Heidelberg (2003)"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-36400-5_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"W. Schindler","year":"2003","unstructured":"Schindler, W., Killmann, W.: Evaluation criteria for true (physical) random number generators used in cryptographic applications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 431\u2013449. Springer, Heidelberg (2003)"},{"key":"5_CR26","unstructured":"Security IC platform protection profile. Tech. Rep. BSI-PP-0035, developed by Atmel, Infineon Technologies AG, NXP Semiconductors, Renesas Technology Europe, and STMicroelectronics, registered and certified by Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn, Germany, June 15 (2007), \n                    \n                      http:\/\/www.commoncriteriaportal.org\/files\/ppfiles\/pp0035b.pdf"},{"key":"5_CR27","unstructured":"Security requirements for cryptographic modules. FIPS PUB 140-2, Change Notice 2, National Institute of Standards and Technology, Gaithersburg, MD, December 3 (2002), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips140-2\/fips1402.pdf"},{"key":"5_CR28","unstructured":"Draft - security requirements for cryptographic modules. FIPS PUB 140-3, National Institute of Standards and Technology, Gaithersburg, MD, April 6 (2007), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips140-3\/fips1403Draft.pdf"},{"key":"5_CR29","unstructured":"Sprunk, E.J.: Robust random number generator. United States Patent No. US6253223B1, June 26 (2001)"},{"key":"5_CR30","unstructured":"Tempest fundamentals (u). Declassified in 2000 under Freedom of Information Act NACSIM 5000, National Security Agency, Ft. George G. Meade, MD, February 1 (1982), \n                    \n                      http:\/\/cryptome.org\/nacsim-5000.zip"},{"issue":"1","key":"5_CR31","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1341312.1341320","volume":"42","author":"D.C. Toll","year":"2008","unstructured":"Toll, D.C., Karger, P.A., Palmer, E.R., McIntosh, S.K., Weber, S.: The caernarvon secure embedded operating system. Operating Systems Review\u00a042(1), 32\u201339 (2008)","journal-title":"Operating Systems Review"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Tsoi, K.H., Leung, K.H., Leong, P.H.W.: Compact FPGA-based true and pseudo random number generators. In: 11th Annual IEEE Symp. on Field-Programmable Custom Computing Machines, Napa, CA, April 9\u201311 (2003)","DOI":"10.1109\/FPGA.2003.1227241"},{"key":"5_CR33","unstructured":"Walsh, J.J., Biesterfeldt, R.P.: Method and apparatus for generating random numbers. United States Patent No. US6480072B1, November 12 (2002)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:15Z","timestamp":1619782935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}