{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:11:13Z","timestamp":1725865873306},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811027406"},{"type":"electronic","value":"9789811027413"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2741-3_6","type":"book-chapter","created":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T03:27:31Z","timestamp":1474860451000},"page":"69-80","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Entropy Sources for True Random Number Generators by Collision Counting"],"prefix":"10.1007","author":[{"given":"Maciej","family":"Sk\u00f3rski","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-04766-4_13","volume-title":"Identity and Privacy in the Internet Age","author":"J Bouda","year":"2009","unstructured":"Bouda, J., Krhovjak, J., Matyas, V., Svenda, P.: Towards true random number generation in mobile environments. In: J\u00f8sang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol. 5838, pp. 179\u2013189. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04766-4_13"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11545262_11","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"M Bucci","year":"2005","unstructured":"Bucci, M., Luzzi, R.: Design of testable random bit generators. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 147\u2013156. Springer, Heidelberg (2005). doi: 10.1007\/11545262_11"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Bassham, III, L.E., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B., Leigh, S.D., Levenson, M., Vangel, M., Banks, D.L., Heckert, N.A., Dray, J.F., Vo, S.: Sp. 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical report, Gaithersburg, MD, USA (2010)","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"6_CR4","unstructured":"Bedekar, N., Shee, C.: A novel approach to true random number generation in wearable computing environments using mems sensors"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-45238-6_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"B Barak","year":"2003","unstructured":"Barak, B., Shaltiel, R., Tromer, E.: True random number generators secure in a changing environment. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 166\u2013180. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45238-6_14"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/3-540-69053-0_14","volume-title":"Advances in Cryptology , EUROCRYPT 1997","author":"C Cachin","year":"1997","unstructured":"Cachin, C.: Smooth entropy and R\u00e9nyi entropy. In: Fumy, W. (ed.) Advances in Cryptology, EUROCRYPT 1997. LNCS, vol. 1233, pp. 193\u2013208. Springer, Heidelberg (1997). doi: 10.1007\/3-540-69053-0_14"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Dorrendorf, L., Gutterman, Z., Pinkas, B.: Cryptanalysis of the windows random number generator. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 476\u2013485. ACM, New York (2007)","DOI":"10.1145\/1315245.1315304"},{"key":"6_CR8","unstructured":"de Raadt, T., Hallqvist, N., Grabowski, A., Keromytis, A.D., Provos, N.: Cryptography in OpenBSD: an overview. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC 1999, p. 33. USENIX Association, Berkeley (1999)"},{"key":"6_CR9","unstructured":"Goldberg, I., Wagner, D.: Randomness and the netscape browser (1996)"},{"key":"6_CR10","unstructured":"Haahr, M.: random.org homepage. Accessed 01 July 2016"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Halprin, R., Naor, M.: Games for extracting randomness. In: Proceedings of the 5th Symposium on Usable Privacy, Security, SOUPS 2009, pp. 12:1\u201312:12. ACM, New York (2009)","DOI":"10.1145\/1572532.1572548"},{"key":"6_CR12","unstructured":"Jun, B., Kocher, P.: The intel random number generator. In: White Paper Prepared for Intel Corporation (1999)"},{"key":"6_CR13","unstructured":"Kaplan, D., Kedmi, S., Hay, R., Dayan, A.: Attacking the linux PRNG on android: weaknesses in seeding of entropic pools and low boot-time entropy. In: 8th USENIX Workshop on Offensive Technologies (WOOT 14). USENIX Association, San Diego (2014)"},{"key":"6_CR14","unstructured":"Krawczyk, P.: A NIST tests implementation. https:\/\/github.com\/kravietz\/nist-sts"},{"key":"6_CR15","unstructured":"Lauradoux, C., Ponge, J., R\u00f6ck, A.: Online entropy estimation for non-binary sources and applications on iPhone. Rapport de recherche, Inria (2011)"},{"key":"6_CR16","unstructured":"Lacharme, P., R\u00f6ck, A., Strubel, V., Videau, M.: The linux pseudorandom number generator revisited, Cryptology ePrint Archive, Report 2012\/251 (2012). http:\/\/eprint.iacr.org\/"},{"key":"6_CR17","unstructured":"Marsaglia, G.: DIEHARD: a battery of tests of randomness. Technical report, Florida State University (1996)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Sunar, B.: True random number generators for cryptography. In: Kaya, K.C. (ed.) Cryptographic Engineering, pp. 55\u201373. Springer, US, (2009) (English)","DOI":"10.1007\/978-0-387-71817-0_4"},{"key":"6_CR19","unstructured":"Turan, M.S., Barker, E., Kelsey, J., McKay, K.A., Baish, M.L., Boyle, M.:"},{"key":"6_CR20","first-page":"36","volume":"12","author":"J Neumann von","year":"1951","unstructured":"von Neumann, J.: Various techniques used in connection with random digits. J. Res. Nat. Bur. Stand. 12, 36\u201338 (1951)","journal-title":"J. Res. Nat. Bur. Stand."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Voris, J., Saxena, N., Halevi, T.: Accelerometers, randomness: perfect together. In: WiSec 2011, pp. 115\u2013126. ACM (2011)","DOI":"10.1145\/1998412.1998433"},{"key":"6_CR22","unstructured":"Walker, J.: Hotbits homepage. Accessed 01 July 2016"},{"key":"6_CR23","unstructured":"Zimmermann, P.: PGP user\u2019s guide"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2741-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T00:27:57Z","timestamp":1568420877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2741-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027406","9789811027413"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2741-3_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}