{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:12:03Z","timestamp":1767183123200,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/asianhost.2016.7835559","type":"proceedings-article","created":{"date-parts":[[2017,1,30]],"date-time":"2017-01-30T16:56:52Z","timestamp":1485795412000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCs"],"prefix":"10.1109","author":[{"given":"M. Tauhidur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[]},{"family":"Xiaoxiao Wang","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495561"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2010.5560296"},{"key":"ref12","first-page":"17","article-title":"FPGA-based true random number generation using circuit metastability with adaptive feedback control","author":"majzoobi","year":"2011","journal-title":"Cryptographic Hardware and Embedded SystemsCHES '07"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2015.2441966"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-642-29912-4_13","article-title":"A closer look at security in random number generators design","volume":"7275","author":"fischer","year":"2012","journal-title":"Constructive Side-Channel Analysis and Secure Design Ser Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2012.6330672"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744786"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024938"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2628071.2628089"},{"journal-title":"Microsemi","article-title":"SmartFusion2 SoC and IGLOO2 FPGA Fabric","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.082"},{"article-title":"Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module","year":"0","author":"mcgill","key":"ref4"},{"article-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Crytographic Applications","year":"2010","author":"rukhin","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/DFT.2014.6962096","article-title":"CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly","author":"tauhidur rahman","year":"2014","journal-title":"IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"},{"article-title":"PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks","year":"2015","author":"dongfang","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2491263"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28368-0_20"},{"key":"ref8","article-title":"We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags","author":"saxena","year":"2009","journal-title":"Proceedings of the Conference on RFID Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2526612"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593236"},{"year":"0","key":"ref1","article-title":"True random number generators for a more secure loT"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.907996"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855578"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2519383"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2014.70"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855586"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495581"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378190"}],"event":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","start":{"date-parts":[[2016,12,19]]},"location":"Yilan, Taiwan","end":{"date-parts":[[2016,12,20]]}},"container-title":["2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7824659\/7835548\/07835559.pdf?arnumber=7835559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T23:27:51Z","timestamp":1568762871000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7835559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/asianhost.2016.7835559","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}