{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T04:15:37Z","timestamp":1747455337209,"version":"3.40.5"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662460771"},{"type":"electronic","value":"9783662460788"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46078-8_49","type":"book-chapter","created":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T14:54:29Z","timestamp":1421247269000},"page":"590-602","source":"Crossref","is-referenced-by-count":0,"title":["True Random Number Generators Secure in a Changing Environment: Improved Security Bounds"],"prefix":"10.1007","author":[{"given":"Maciej","family":"Skorski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/SFCS.1994.365687","volume-title":"Proceedings of the 35th Annual Symposium on Foundations of Computer Science, SFCS 1994","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rompel, J.: Randomness-efficient oblivious sampling. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science, SFCS 1994, pp. 276\u2013287. IEEE Computer Society, Washington, DC (1994)"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Bassham, I.L.E., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B., Leigh, S.D., Levenson, M., Vangel, M., Banks, D.L., Heckert, N.A., Dray, J.F., Vo, S.: Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications, Tech. report, Gaithersburg, MD, United States (2010)","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"49_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-45238-6_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"B. Barak","year":"2003","unstructured":"Barak, B., Shaltiel, R., Tromer, E.: True random number generators secure in a changing environment. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 166\u2013180. Springer, Heidelberg (2003)"},{"key":"49_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-45198-3_18","volume-title":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques","author":"B. Barak","year":"2003","unstructured":"Barak, B., Shaltiel, R., Wigderson, A.: Computational analogues of entropy. In: Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003. LNCS, vol.\u00a02764, pp. 200\u2013215. Springer, Heidelberg (2003)"},{"key":"49_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804106","volume-title":"Computational complexity: A conceptual perspective","author":"O. Goldreich","year":"2008","unstructured":"Goldreich, O.: Computational complexity: A conceptual perspective, 1st edn. Cambridge University Press, New York (2008)","edition":"1"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Gabizon, A., Raz, R.: Deterministic extractors for affine sources over large fields. In: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pp. 407\u2013418. IEEE Computer Society, Washington, DC (2005)","DOI":"10.1109\/SFCS.2005.31"},{"key":"49_CR7","unstructured":"Goldberg, I., Wagner, D.: Randomness and the netscape browser (1996)"},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/SFCS.2003.1238184","volume-title":"Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2003","author":"J. Kamp","year":"2003","unstructured":"Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2003, p. 92. IEEE Computer Society, Washington, DC (2003)"},{"key":"49_CR9","unstructured":"Marsaglia, G.: DIEHARD: A battery of tests of randomness, Technical report, Florida State University, Tallahassee, FL, USA (1996)"},{"issue":"1","key":"49_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1006\/jcss.1996.0004","volume":"52","author":"N. Nisan","year":"1996","unstructured":"Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci.\u00a052(1), 43\u201352 (1996)","journal-title":"J. Comput. Syst. Sci."},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. Siam Journal on Discrete Mathematics\u00a013 (2000)","DOI":"10.1137\/S0895480197329508"},{"issue":"1","key":"49_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0022-0000(86)90044-9","volume":"33","author":"M. Santha","year":"1986","unstructured":"Santha, M., Vazirani, U.V.: Generating quasi-random sequences from semi-random sources. Journal of Computer and System Sciences\u00a033(1), 75\u201387 (1986)","journal-title":"Journal of Computer and System Sciences"},{"key":"49_CR13","unstructured":"Walker, J.: Hotbits: Genuine random numbers, generated by radioactive decay (2011)"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2015: Theory and Practice of Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46078-8_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T22:17:07Z","timestamp":1747433827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46078-8_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662460771","9783662460788"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46078-8_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}