{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:20:21Z","timestamp":1725412821474},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/ispacs.2015.7432793","type":"proceedings-article","created":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T20:24:03Z","timestamp":1457987043000},"page":"342-345","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of an ADC-based Random Number Generator from a chaotic oscillator"],"prefix":"10.1109","author":[{"given":"Salih","family":"Ergun","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E94.A.180"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD.2007.4529774"},{"journal-title":"NIST 800&#x2013;22","article-title":"A Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications","year":"2001","key":"ref12"},{"article-title":"Diehard: A Battery of Tests of Randomness","year":"1997","author":"marsalgia","key":"ref13"},{"key":"ref14","article-title":"Empirical Testing of Random Number Generators","author":"l'ecuyer","year":"2002","journal-title":"Universit'e de Montr'eal"},{"key":"ref15","first-page":"314327","article-title":"Synchronization principles and applications","author":"hasler","year":"1994","journal-title":"Tutorials IEEE Int Symposium on Circuits and Systems (ISCAS '94)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.64.821"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2010.2089561"},{"key":"ref3","first-page":"394","article-title":"On the Universality of the Next Bit Test","author":"schrift","year":"1990","journal-title":"Proc of CRYPTO"},{"key":"ref6","first-page":"48","article-title":"A High Quality Physical Random Number Generator","author":"dichtl","year":"2000","journal-title":"Proc Sophia Antipolis Forum Microelectronics (SAME 2000)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/81.586025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/81.915385"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2011.06.001"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/cta.301"}],"event":{"name":"2015 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","start":{"date-parts":[[2015,11,9]]},"location":"Nusa Dua","end":{"date-parts":[[2015,11,12]]}},"container-title":["2015 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7428504\/7432721\/07432793.pdf?arnumber=7432793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T08:18:36Z","timestamp":1498292316000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7432793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ispacs.2015.7432793","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}