{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:28:02Z","timestamp":1757456882174,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609376"},{"type":"electronic","value":"9789819609383"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0938-3_15","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T18:22:40Z","timestamp":1733941360000},"page":"461-490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Provable Security of\u00a0Linux-DRBG in\u00a0the\u00a0Seedless Robustness Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3793-5291","authenticated-orcid":false,"given":"Woohyuk","family":"Chung","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3010-5116","authenticated-orcid":false,"given":"Hwigyeom","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5471-9350","authenticated-orcid":false,"given":"Jooyoung","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1569-0775","authenticated-orcid":false,"given":"Yeongmin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"J.-P. Aumasson, S.\u00a0Neves, Z.\u00a0Wilcox-O\u2019Hearn, and C.\u00a0Winnerlein. Blake2: simpler, smaller, fast as md5. In Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 11, pages 119\u2013135. Springer, 2013.","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"B.\u00a0Barak and S.\u00a0Halevi. A Model and Architecture for Pseudo-Random Generation with Applications to \/Dev\/Random. In Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS \u201905, page 203\u2013212, New York, NY, USA, 2005.Association for Computing Machinery.","DOI":"10.1145\/1102120.1102148"},{"key":"15_CR3","unstructured":"D.\u00a0J. Bernstein et\u00a0al. Chacha, a variant of salsa20."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"G.\u00a0Bertoni, J.\u00a0Daemen, M.\u00a0Peeters, and G.\u00a0Van\u00a0Assche. Sponge-based pseudo-random number generators. In Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings 12, pages 33\u201347. Springer, 2010.","DOI":"10.1007\/978-3-642-15031-9_3"},{"key":"15_CR5","unstructured":"A.\u00a0Biryukov, A.\u00a0Udovenko, and V.\u00a0Velichkov. Analysis of the norx core permutation. Cryptology ePrint Archive, 2017."},{"key":"15_CR6","unstructured":"M.\u00a0J. Campagna. Security bounds for the nist codebook-based deterministic random bit generator. Cryptology ePrint Archive, Paper 2006\/379, 2006. https:\/\/eprint.iacr.org\/2006\/379."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"C.\u00a0Chaigneau, T.\u00a0Fuhr, H.\u00a0Gilbert, J.\u00a0Jean, and J.-R. Reinhard. Cryptanalysis of norx v2. 0. Journal of Cryptology, 32:1423\u20131447, 2019.","DOI":"10.1007\/s00145-018-9297-9"},{"key":"15_CR8","unstructured":"W.\u00a0Chung, H.\u00a0Kim, J.\u00a0Lee, and Y.\u00a0Lee. Provable security of Linux-DRBG in the seedless robustness model. Cryptology ePrint Archive, Paper 2024\/1421, 2024."},{"key":"15_CR9","unstructured":"S.\u00a0Coretti, Y.\u00a0Dodis, H.\u00a0Karthikeyan, N.\u00a0Stephens-Davidowitz, and S.\u00a0Tessaro. On seedless prngs and premature next. Cryptology ePrint Archive, 2022."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"S.\u00a0Coretti, Y.\u00a0Dodis, H.\u00a0Karthikeyan, and S.\u00a0Tessaro. Seedless fruit is the sweetest: Random number generation, revisited. In Annual International Cryptology Conference, pages 205\u2013234. Springer, 2019.","DOI":"10.1007\/978-3-030-26948-7_8"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"J.\u00a0P. Degabriele, J.\u00a0Govinden, F.\u00a0G\u00fcnther, and K.\u00a0G. Paterson. The security of chacha20-poly1305 in the multi-user setting. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201921, page 1981\u20132003, New York, NY, USA, 2021. Association for Computing Machinery.","DOI":"10.1145\/3460120.3484814"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Dodis, D.\u00a0Pointcheval, S.\u00a0Ruhault, D.\u00a0Vergniaud, and D.\u00a0Wichs. Security Analysis of Pseudo-Random Number Generators with Input: \/Dev\/Random is Not Robust. CCS \u201913, page 647\u2013658, New York, NY, USA, 2013. Association for Computing Machinery.","DOI":"10.1145\/2508859.2516653"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"P.\u00a0Ga\u017ei and S.\u00a0Tessaro. Provably robust sponge-based prngs and kdfs. In Advances in Cryptology\u2013EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I 35, pages 87\u2013116. Springer, 2016.","DOI":"10.1007\/978-3-662-49890-3_4"},{"key":"15_CR14","unstructured":"F.\u00a0Goichon, C.\u00a0Lauradoux, G.\u00a0Salagnac, and T.\u00a0Vuillemin. Entropy transfers in the Linux random number generator. PhD thesis, INRIA, 2012."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Gutterman, B.\u00a0Pinkas, and T.\u00a0Reinman. Analysis of the linux random number generator. In 2006 IEEE Symposium on Security and Privacy (S &P\u201906), pages 15\u2013pp. IEEE, 2006.","DOI":"10.1109\/SP.2006.5"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"S.\u00a0Hirose. Security analysis of drbg using hmac in nist sp 800-90. In K.-I. Chung, K.\u00a0Sohn, and M.\u00a0Yung, editors, Information Security Applications, pages 278\u2013291, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-00306-6_21"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"V.\u00a0T. Hoang and Y.\u00a0Shen. Security analysis of nist ctr-drbg. In Advances in Cryptology\u2013CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17\u201321, 2020, Proceedings, Part I, pages 218\u2013247. Springer, 2020.","DOI":"10.1007\/978-3-030-56784-2_8"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"A.\u00a0Luykx, B.\u00a0Mennink, and S.\u00a0Neves. Security analysis of blake2\u2019s modes of operation. IACR Transactions on Symmetric Cryptology, pages 158\u2013176, 2016.","DOI":"10.46586\/tosc.v2016.i1.158-176"},{"key":"15_CR19","unstructured":"S.\u00a0M\u00fcller. Documentation and analysis of the linux random number generator. Federal Office for Information Security, 2020."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"S.\u00a0Ruhault. Sok: Security models for pseudo-random number generators. IACR Transactions on Symmetric Cryptology, pages 506\u2013544, 2017.","DOI":"10.46586\/tosc.v2017.i1.506-544"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"T.\u00a0Shrimpton and R.\u00a0S. Terashima. A provable-security analysis of intel\u2019s secure key rng. In Advances in Cryptology\u2013EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, pages 77\u2013100. Springer, 2015.","DOI":"10.1007\/978-3-662-46800-5_4"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"T.\u00a0Shrimpton and R.\u00a0S. Terashima. Salvaging weak security bounds for blockcipher-based constructions. In ASIACRYPT (1), pages 429\u2013454. Springer, 2016.","DOI":"10.1007\/978-3-662-53887-6_16"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"J.\u00a0Woodage and D.\u00a0Shumow. An analysis of nist sp 800-90a. 11477:151\u2013180, 2019.","DOI":"10.1007\/978-3-030-17656-3_6"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"J.\u00a0Woodage and D.\u00a0Shumow. An analysis of nist sp 800-90a. In Advances in Cryptology\u2013EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19\u201323, 2019, Proceedings, Part II 38, pages 151\u2013180. Springer, 2019.","DOI":"10.1007\/978-3-030-17656-3_6"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"K.\u00a0Q. Ye, M.\u00a0Green, N.\u00a0Sanguansin, L.\u00a0Beringer, A.\u00a0Petcher, and A.\u00a0W. Appel. Verified correctness and security of mbedtls hmac-drbg. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 2007\u20132020, 2017.","DOI":"10.1145\/3133956.3133974"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0938-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T19:31:19Z","timestamp":1733945479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0938-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819609376","9789819609383"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0938-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}