{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:51:55Z","timestamp":1752360715206,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icce.2019.8662060","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T18:51:52Z","timestamp":1551984712000},"page":"1-6","source":"Crossref","is-referenced-by-count":18,"title":["Exploiting DRAM Latency Variations for Generating True Random Numbers"],"prefix":"10.1109","author":[{"given":"B. M. S.","family":"Bahar Talukder","sequence":"first","affiliation":[]},{"given":"Joseph","family":"Kerns","sequence":"additional","affiliation":[]},{"given":"Biswajit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Morris","sequence":"additional","affiliation":[]},{"given":"Md Tauhidur","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0036-1"},{"article-title":"eBACS: ECRYPT Benchmarking of Cryptographic Systems","year":"0","author":"daniel","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-22r1a"},{"article-title":"Introductory statistics","year":"1969","author":"wonnacott","key":"ref30"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/3-540-69710-1_12","article-title":"Cryptanalytic Attacks on Pseudorandom Number Generators","author":"kelsey","year":"1998","journal-title":"Fast Software Encryption Lecture Notes in Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855578"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053159"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835559"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2018.2792436"},{"key":"ref15","article-title":"Microcontroller TRNGs Using Perturbed States of NOR Flash Memory Cells","author":"poudel","year":"2018","journal-title":"IEEE Transactions on Computers"},{"key":"ref16","article-title":"D-PUF: An Intrinsically Reconfigurable DRAM PUF for Device Authentication and Random Number Generation","volume":"17","author":"sutar","year":"2017","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0012-3"},{"article-title":"LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures","year":"2018","author":"talukder","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2964791.2901453"},{"year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2017.8354001"},{"key":"ref27","first-page":"241","article-title":"SoftMC: A Flexible and Practical Open-Source Infrastructure for Enabling Experimental DRAM Studies","author":"hassan","year":"2017","journal-title":"IEEE International Symposium on High-Performance Comp Architecture"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2016.2566262"},{"year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"ref8","first-page":"16","article-title":"Robust, low-cost, auditable random number generation for embedded system security","author":"ben","year":"2016","journal-title":"ACM Conference on Embedded Networked Sensor Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593236"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NATW.2014.17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_5"},{"journal-title":"American Banker","article-title":"Cyberattacks took $56B from U.S. economy in 16: Report","year":"2018","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2011.2160066"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00026"},{"year":"2012","key":"ref21","article-title":"DDR3 SDRAM Standard"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21040-2_12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2017.7993610"},{"article-title":"Cryptographic Hash Functions","year":"2009","author":"thomsen","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.180-4"}],"event":{"name":"2019 IEEE International Conference on Consumer Electronics (ICCE)","start":{"date-parts":[[2019,1,11]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2019,1,13]]}},"container-title":["2019 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8656627\/8661828\/08662060.pdf?arnumber=8662060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:17:13Z","timestamp":1657840633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8662060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icce.2019.8662060","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}