{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T04:34:14Z","timestamp":1774586054580,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642150302","type":"print"},{"value":"9783642150319","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_3","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T11:34:35Z","timestamp":1281180875000},"page":"33-47","source":"Crossref","is-referenced-by-count":63,"title":["Sponge-Based Pseudo-Random Number Generators"],"prefix":"10.1007","author":[{"given":"Guido","family":"Bertoni","sequence":"first","affiliation":[]},{"given":"Joan","family":"Daemen","sequence":"additional","affiliation":[]},{"given":"Micha\u00ebl","family":"Peeters","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Van Assche","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security 1993, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"3_CR2","unstructured":"Bellare, M., Yee, B.: Forward-security in private-key cryptography, Cryptology ePrint Archive, Report 2001\/035 (2001), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"3_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: Ecrypt Hash Workshop 2007 (May 2007), also available as public comment to NIST, \n                    \n                      http:\/\/www.csrc.nist.gov\/pki\/HashWorkshop\/Public_Comments\/2007_May.html"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-78967-3_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"G. Bertoni","year":"2008","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the indifferentiability of the sponge construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 181\u2013197. Springer, Heidelberg (2008), \n                    \n                      http:\/\/sponge.noekeon.org\/"},{"key":"3_CR5","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponges (2009), \n                    \n                      http:\/\/sponge.noekeon.org\/"},{"key":"3_CR6","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications, version 2, NIST SHA-3 Submission (September 2009), \n                    \n                      http:\/\/keccak.noekeon.org\/"},{"key":"3_CR7","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document, NIST SHA-3 Submission (updated) (September 2009), \n                    \n                      http:\/\/keccak.noekeon.org\/"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/11535218_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"J. Coron","year":"2005","unstructured":"Coron, J., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damg\u00e5rd revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 430\u2013448. Springer, Heidelberg (2005)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/3-540-46035-7_24","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"A. Desai","year":"2002","unstructured":"Desai, A., Hevia, A., Yin, Y.L.: A practice-oriented treatment of pseudorandom number generators. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 368\u2013383. Springer, Heidelberg (2002)"},{"key":"3_CR10","volume-title":"Practical cryptography","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical cryptography. John Wiley & Sons, Chichester (2003)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-24638-1_2","volume-title":"Theory of Cryptography","author":"U. Maurer","year":"2004","unstructured":"Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 21\u201339. Springer, Heidelberg (2004)"},{"key":"3_CR12","unstructured":"NIST: Federal information processing standard 186-2, digital signature standard (DSS) (May 1994)"},{"issue":"212","key":"3_CR13","first-page":"62212","volume":"72","author":"NIST","year":"2007","unstructured":"NIST: Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register Notices\u00a072(212), 62212\u201362220 (2007), \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/index.html","journal-title":"Federal Register Notices"},{"key":"3_CR14","unstructured":"NIST: NIST special publication 800-90, recommendation for random number generation using deterministic random bit generators (revised) (March 2007)"},{"key":"3_CR15","unstructured":"NIST: NIST special publication 800-22, a statistical test suite for random and pseudorandom number generators for cryptographic applications (revision 1) (August 2008)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/CSAC.2003.1254318","volume-title":"ACSAC \u201903: Proceedings of the 19th Annual Computer Security Applications Conference","author":"J. Viega","year":"2003","unstructured":"Viega, J.: Practical random number generation in software. In: ACSAC \u201903: Proceedings of the 19th Annual Computer Security Applications Conference, Washington, DC, USA, p. 129. IEEE Computer Society, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T18:56:49Z","timestamp":1552849009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}