{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:52:49Z","timestamp":1769842369485,"version":"3.49.0"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Basic Science Research Program through the National Research Foundation of Korea (NRF), Ministry of Education","doi-asserted-by":"publisher","award":["NRF-2015R1D1A1A01057300"],"award-info":[{"award-number":["NRF-2015R1D1A1A01057300"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2799682","type":"journal-article","created":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T14:24:49Z","timestamp":1517408689000},"page":"12838-12847","source":"Crossref","is-referenced-by-count":58,"title":["TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1477-7569","authenticated-orcid":false,"given":"Kyungroul","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sun-Young","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Changho","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1364\/OL.35.000312"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2014.6742986"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2008.920327"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2004.831480"},{"key":"ref31","first-page":"33","article-title":"A 0.43 pJ\/bit true random number generator","author":"kuan","year":"2014","journal-title":"Proc IEEE Asian Solid-State Circuits Conf"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2013.2246777"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2015.2479411"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICASIC.2001.982700"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2010.5619875"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2013.6716186"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1049\/el.2014.2870"},{"key":"ref62","year":"2018","journal-title":"Visible Spectrum"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.20465\/KIOTS.2016.2.1.023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2014.6882689"},{"key":"ref28","author":"motchenbacher","year":"1993","journal-title":"Low-Noise Electronic System Design"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462122"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2006.05.006"},{"key":"ref65","article-title":"Using GPU as hardware random number generator","author":"yoo","year":"2015","journal-title":"Proc GPU Technology Conf"},{"key":"ref29","author":"gray","year":"1977","journal-title":"Analysis and Design of Analog Integrated Circuits"},{"key":"ref2","year":"0","journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications"},{"key":"ref1","first-page":"420","article-title":"Random password generation of OTP system using changed location and angle of fingerprint features","author":"cha","year":"2008","journal-title":"Proc IEEE Int Conf Comput Inf Technol"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/el:19920389"},{"key":"ref22","first-page":"164","author":"vasyltsov","year":"2008","journal-title":"Fast Digital TRNG Based on Metastable Ring Oscillator"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_13"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1049\/el.2010.0893","article-title":"Ultra-lightweight true random number generators","volume":"46","author":"qu","year":"2010","journal-title":"Electron Lett"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513099"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/81.915385"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839924"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1109\/PROC.1987.13852","article-title":"chaos from switched-capacitor circuits: discrete maps","volume":"75","author":"rodriguez-vazquez","year":"1987","journal-title":"Proceedings of the IEEE"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1049\/el:19911188"},{"key":"ref59","first-page":"541","article-title":"Practically secure and efficient random bit generator using digital fingerprint image for the source of random","volume":"10d","author":"park","year":"2003","journal-title":"J Korea Inf Process Soc"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1364\/OE.18.023584"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1063\/1.3578456"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1063\/1.1150518"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5183\/jjscs1988.12.67"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2001.972853"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/BF01239169"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/81.129465"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288114"},{"key":"ref11","author":"jun","year":"1999","journal-title":"The Intel Random Number Generator"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132901"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/81.847868"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190581"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_18"},{"key":"ref15","first-page":"48","article-title":"A high quality physical random number generator","author":"dichtl","year":"2000","journal-title":"Proc Sophia Antipolis Forum MicroElectronics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2010.5724498"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2011.5783072"},{"key":"ref4","author":"davies","year":"1989","journal-title":"Security for Computer Networks An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer"},{"key":"ref3","year":"0","journal-title":"Recommendation for the Entropy Sources Used for Random Bit Generation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119191865812"},{"key":"ref5","author":"jansson","year":"1966","journal-title":"Random Number Generators"},{"key":"ref8","first-page":"77","article-title":"Random sources for cryptographic systems","author":"agnew","year":"1987","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/el:19870473"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_13"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.1015005"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4286-4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCS.1985.1085626"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-95972-4_17"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462122"},{"key":"ref41","first-page":"216","article-title":"Goodness-of-fit and randomness tests for the sun&#x2019;s emissions true random number generator","author":"tanyer","year":"2014","journal-title":"Proc Int Conf Math Comput Sci Ind"},{"key":"ref44","author":"hirsch","year":"2013","journal-title":"Differential Equations Dynamical Systems and an Introduction to Chaos"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1364\/OL.34.001876"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08276259.pdf?arnumber=8276259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:38:35Z","timestamp":1641987515000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8276259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2799682","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}