{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T06:27:19Z","timestamp":1763447239567,"version":"3.45.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,29]]},"DOI":"10.1109\/socc66126.2025.11235484","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T18:39:03Z","timestamp":1763404743000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["High-Entropy LFSR-Based Random Number Generator (RNG) for Hardware Security"],"prefix":"10.1109","author":[{"given":"Sonia","family":"Akter","sequence":"first","affiliation":[{"name":"University of Louisiana at Lafayette,The Center for Advanced Computer Studies,LA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shelby","family":"Williams","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette,The Center for Advanced Computer Studies,LA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Prosen","family":"Kirtonia","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette,Department of Electrical and Computer Engineering,LA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kasem","family":"Khalil","sequence":"additional","affiliation":[{"name":"University of Mississippi,Department of Electrical and Computer Engineering,Mississippi,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Magdy","family":"Bayoumi","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette,The Center for Advanced Computer Studies,LA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-76328-1_11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3355168"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221153"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1032761"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE63041.2024.10668349"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100293"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-76328-1_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-024-00056-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3288696"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-76328-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-76328-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/355744.355749"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-88702-7","article-title":"Post-quantum cryptography","author":"Bernstein","year":"2009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DCAS61159.2024.10539915"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon52093.2024.10500289"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS60917.2024.10658701"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC58585.2023.10256974"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2024.3411549"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/31.101308"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"ref21","first-page":"538","article-title":"On reducing test length in lfsr based testing","volume-title":"Proceedings of International Test Conference 1992","author":"Pomeranz"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22"},{"key":"ref23","article-title":"Recommendation for the entropy sources used for random bit generation","volume-title":"Special Publication (SP) 800-90B","author":"Barker","year":"2018"},{"year":"2001","key":"ref24","article-title":"FIPS PUB 140-2: Security Requirements for Cryptographic Modules"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.spasta.2014.11.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2023.3241122"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3656236"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN52536.2021.9566149"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3512419"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50816.2021.9358750"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISOCC59558.2023.10396483"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/YEF-ECE55092.2022.9849994"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04027-x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ASSCC.2009.5357193"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICMDCS.2017.8211608"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON47234.2019.9029049"},{"key":"ref37","first-page":"78","article-title":"Fpga based true random number generator using lfsr and dynamic seed","volume-title":"Proceedings of the IEEE International Symposium on Hardware Security","author":"Zode"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISOCC.2017.8368897"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR64496.2024.00024"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR60563.2023.00025"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i3.151-168"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/idap.2018.8620811"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2024.102305"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3512419"}],"event":{"name":"2025 IEEE 38th International System-on-Chip Conference (SOCC)","start":{"date-parts":[[2025,9,29]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2025,10,1]]}},"container-title":["2025 IEEE 38th International System-on-Chip Conference (SOCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11235309\/11235311\/11235484.pdf?arnumber=11235484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T06:23:08Z","timestamp":1763446988000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11235484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/socc66126.2025.11235484","relation":{},"subject":[],"published":{"date-parts":[[2025,9,29]]}}}