{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:26:15Z","timestamp":1770276375912,"version":"3.49.0"},"reference-count":19,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Comput. Digit. Tech."],"published-print":{"date-parts":[[2007,7,2]]},"DOI":"10.1049\/iet-cdt:20050173","type":"journal-article","created":{"date-parts":[[2007,7,6]],"date-time":"2007-07-06T02:22:24Z","timestamp":1183688544000},"page":"349-352","source":"Crossref","is-referenced-by-count":17,"title":["High performance physical random number generator"],"prefix":"10.1049","volume":"1","author":[{"given":"K.H.","family":"Tsoi","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong"}]},{"given":"K.H.","family":"Leung","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong"}]},{"given":"P.H.W.","family":"Leong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong"}]}],"member":"265","reference":[{"key":"10.1049\/iet-cdt:20050173_r1","first-page":"203","author":"Fairfield","year":"1984","journal-title":"Advances in Cryptography: Proc. of Crypto 84"},{"key":"10.1049\/iet-cdt:20050173_r2","unstructured":"White paper by Cryptographic Research Inc.\u2018The Intel random number generator\u2019, 1999 ftp:\/\/download.intel.com\/design\/security\/rng\/CRIwp.pdf"},{"key":"10.1049\/iet-cdt:20050173_r3","first-page":"51","author":"Tsoi","year":"2003","journal-title":"Proc. IEEE Symp. on Field-Programmable Custom Computing Machines (FCCM)"},{"key":"10.1049\/iet-cdt:20050173_r4","first-page":"415","author":"Fischer","year":"2002","journal-title":"Proc. Cryptographic Hardware and Embedded Systems Workshop (CHES)"},{"key":"10.1049\/iet-cdt:20050173_r5","first-page":"382","volume":"48","author":"Stojanovski","year":"2001"},{"key":"10.1049\/iet-cdt:20050173_r6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/SSMSD.2001.914944","author":"Gerosa","year":"2001","journal-title":"SSMSD. 2001 Southwest Symp. on Mixed-Signal Design"},{"key":"10.1049\/iet-cdt:20050173_r7","first-page":"615","volume":"47","author":"Petrie","year":"2000","ISSN":"https:\/\/id.crossref.org\/issn\/0018-9200","issn-type":"print"},{"key":"10.1049\/iet-cdt:20050173_r8","author":"Eastlake","year":"1994"},{"key":"10.1049\/iet-cdt:20050173_r9","first-page":"5","volume":"87","author":"Gunther","year":"1988","journal-title":"Advances in Cryptology: Proc. Eurocrypt"},{"key":"10.1049\/iet-cdt:20050173_r10","unstructured":"Menezes, A., van Oorschot, P., and Vanstone, S.: \u2018Handbook of applied cryptography\u2019, (CRC Press 1997)"},{"key":"10.1049\/iet-cdt:20050173_r11","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/3-540-38424-3_3","author":"Zheng","year":"1991","journal-title":"Advances in Cryptology: Crypto '90"},{"key":"10.1049\/iet-cdt:20050173_r12","first-page":"499","author":"Golic","year":"1998","journal-title":"Advances in Cryptology: Crypto '97"},{"key":"10.1049\/iet-cdt:20050173_r13","doi-asserted-by":"publisher","DOI":"10.1109\/4.494195"},{"key":"10.1049\/iet-cdt:20050173_r14","unstructured":"Xilinx Virtex 2.5\u2005V field programmable gate arrays 2000"},{"key":"10.1049\/iet-cdt:20050173_r15","unstructured":"U.S. Department of Commerce, Security Requirements for Cryptographic Modules. Federal Information Processing Standards Publication FIPS 140-1 1994"},{"key":"10.1049\/iet-cdt:20050173_r16","first-page":"170","author":"Leong","year":"2001","journal-title":"Proc. IEEE Symp. on Field-Programmable Custom Computing Machines (FCCM)"},{"key":"10.1049\/iet-cdt:20050173_r17","unstructured":"NIST Special Publication 800-22\u2018A statistical test suit for random and pseudorandom number generators for cryptographic applications\u2019, 2001"},{"key":"10.1049\/iet-cdt:20050173_r18","unstructured":"Intel Platform Security Division: \u2018The Intel random number generator\u2019. Intel technical brief, 1999. ftp:\/\/download.intel.com\/design\/security\/rng\/techbrief.pdf"},{"key":"10.1049\/iet-cdt:20050173_r19","first-page":"4","volume":"33","author":"L'Ecuyer","year":"2007"}],"container-title":["IET Computers &amp; Digital Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-cdt_20050173?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T15:10:49Z","timestamp":1731424249000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-cdt%3A20050173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7,2]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,7,2]]}},"alternative-id":["10.1049\/iet-cdt:20050173"],"URL":"https:\/\/doi.org\/10.1049\/iet-cdt:20050173","relation":{},"ISSN":["1751-8601","1751-861X"],"issn-type":[{"value":"1751-8601","type":"print"},{"value":"1751-861X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,7,2]]}}}