{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:22:31Z","timestamp":1729653751509,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icecs.2003.1301813","type":"proceedings-article","created":{"date-parts":[[2004,6,3]],"date-time":"2004-06-03T16:14:56Z","timestamp":1086279296000},"page":"427-430","source":"Crossref","is-referenced-by-count":3,"title":["Analysis and design of digital PRNGS based on the discretized sawtooth map"],"prefix":"10.1109","author":[{"given":"M.","family":"Alioto","sequence":"first","affiliation":[]},{"given":"S.","family":"Bernardi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Fort","sequence":"additional","affiliation":[]},{"given":"S.","family":"Rocchi","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vignoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2001.957776"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/81.974880"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/81.915385"},{"key":"ref6","first-page":"391","article-title":"Chaos from Digital Circuits: Discrete Maps","author":"huertas","year":"1989","journal-title":"Int Symp on Networks Systems and Signal Processing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.1999.777606"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1023\/A:1021976717094","article-title":"High-Speed True Random Noise Generator","volume":"34","author":"cortigiani","year":"2003","journal-title":"Analog Integrated Circuits and Signal Processing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.1992.254942"},{"article-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref2"},{"key":"ref9","first-page":"140","article-title":"Security Requirements for Cryptographic Modules","year":"1999","journal-title":"Federal Information Processing Standards Publication"},{"article-title":"The Art of Computer Programming, vol. 2: Seminumerical Algorithms","year":"1981","author":"knuth","key":"ref1"}],"event":{"name":"2003 10th IEEE International Conference on Electronics, Circuits, and Systems","acronym":"ICECS-03","location":"Sharjah, United Arab Emirates"},"container-title":["10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9125\/28926\/01301813.pdf?arnumber=1301813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:47:20Z","timestamp":1497584840000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1301813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icecs.2003.1301813","relation":{},"subject":[]}}