{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:13:02Z","timestamp":1725707582667},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642355998"},{"type":"electronic","value":"9783642356001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35600-1_14","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T12:31:37Z","timestamp":1353933097000},"page":"96-102","source":"Crossref","is-referenced-by-count":2,"title":["Generating Random Numbers for Cryptographic Modules Using Race Conditions in GPU"],"prefix":"10.1007","author":[{"given":"Yongjin","family":"Yeom","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Barker, E., Kelsey, J.: Recommendation for the Entropy Sources Used for Random Bit Generation. NIST Draft Special Publication 800-90B (2012)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Chan, J., Sharma, B., Lv, J., Thomas, G., Thulasiram, R., Thulasirman, P.: True random number generator using GPUs and Histogram equalization techniques. In: IEEE Conference on High Performance Computing and Communications (2011)","DOI":"10.1109\/HPCC.2011.30"},{"key":"14_CR3","unstructured":"CUDA, \n                  \n                    http:\/\/www.nvidia.com\/cuda"},{"issue":"1","key":"14_CR4","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1609956.1609966","volume":"13","author":"L. Dorrendorf","year":"2009","unstructured":"Dorrendorf, L., Gutterman, Z., Pinkas, B.: Cryptanalysis of the Random Number Generator of the Windows Operating System. ACM Transactions on Information and System Security\u00a013(1), Article 10 (2009)","journal-title":"ACM Transactions on Information and System Security"},{"key":"14_CR5","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Prentice Hall (2002)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Gutterman, Z., Pinkas, B., Rienman, T.: Analysis of the Linux Random Number Generator. In: IEEE Symposium on Security and Privacy (2006)","DOI":"10.1109\/SP.2006.5"},{"key":"14_CR7","unstructured":"ISO\/IEC 18031: Information technology - Security techniques - Random bit generation (2011)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-13858-4_5","volume-title":"Fast Software Encryption","author":"D.A. Osvik","year":"2010","unstructured":"Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast Software AES Encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol.\u00a06147, pp. 75\u201393. Springer, Heidelberg (2010)"},{"key":"14_CR9","unstructured":"Zafar, F., Olano, M., Curtis, A.: GPU Random Number via the Tiny Encryption Algorithm. In: High Performance Graphics (2010)"}],"container-title":["Communications in Computer and Information Science","Computer Applications for Graphics, Grid Computing, and Industrial Environment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35600-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T06:22:41Z","timestamp":1557382961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35600-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642355998","9783642356001"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35600-1_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}