{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:48:13Z","timestamp":1776977293071,"version":"3.51.4"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472095","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Approach to Cryptographically Secure Pseudorandom Number Generation"],"prefix":"10.1109","author":[{"given":"Mandana","family":"Ewert","sequence":"first","affiliation":[{"name":"Hochschule Bonn-Rhein-Sieg,Department of Computer Science,Sankt Augustin,Germany"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Analyzing the Energy Consumption of Security Protocols","author":"Nachiketh","year":"2003"},{"key":"ref2","first-page":"141","volume-title":"Mathematical methods in large-scale computing units","author":"Lehmer","year":"1951"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/63039.63042"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/bf02932576"},{"key":"ref5","volume-title":"The Art of Computer Programming, Vol. 2 Seminumerical Algorithms","author":"Knuth","year":"1998"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2307\/2347988"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2009.10.015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1965-0184406-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v008.i14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1132973.1132974"},{"key":"ref12","article-title":"Scrambled Linear Pseudorandom Number Generators","author":"Blackman","year":"2018"},{"key":"ref13","article-title":"PCG: A Family of Simple Fast Space-Efficient Statistically Good Algorithms for Random Number Generation","author":"O\u2019Neill","year":"2014","journal-title":"Harvey Mudd College Computer Science Department Technical Report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2019.8924431"},{"issue":"2","key":"ref15","article-title":"SIAM Journal on Computing","volume":"15","author":"Blum","year":"1986"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_24"},{"key":"ref17","author":"Schneier","year":"1998","journal-title":"Twofish: A 128-Bit Block Cipher"},{"key":"ref18","volume-title":"Federal Information Processing Standards Publication 197","year":"2001"},{"key":"ref19","article-title":"ChaCha, a variant of Salsa20","volume-title":"Department of Mathematics, Statistics, and Computer Science (M\/C 249)","author":"Bernstein"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62969"},{"issue":"2","key":"ref21","first-page":"136","article-title":"A pseudo-random number generator for the System\/360","volume":"8","author":"Goodman","year":"1969","journal-title":"IBM"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/321008.321019"},{"key":"ref23","first-page":"2","volume-title":"The Art of Computer Programming","author":"Knuth","year":"1981"},{"issue":"1","key":"ref24","first-page":"24","article-title":"An Exhaustive Analysis of Multiplicative Congruential Random Number Generators with Modulus 231\u22121","volume":"7","author":"Fishman","year":"1986","journal-title":"ACM"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1037\/e410902004-001"},{"key":"ref26","volume-title":"Statistical functions","year":"2022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22"},{"key":"ref28","volume-title":"Encyclopedia of Mathematics","author":"Waring","year":"1770"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-90b"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472095.pdf?arnumber=11472095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:56:43Z","timestamp":1776974203000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472095","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}