{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T19:58:17Z","timestamp":1740167897571,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","funder":[{"DOI":"10.13039\/501100004359","name":"Swedish Research Council","doi-asserted-by":"publisher","award":["2018-04482"],"award-info":[{"award-number":["2018-04482"]}],"id":[{"id":"10.13039\/501100004359","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001858","name":"Vinnova Competence Center for Trustworthy Edge Computing Systems and Applications at KTH Royal Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. II"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/tcsii.2021.3066338","type":"journal-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T19:41:30Z","timestamp":1616010090000},"page":"1710-1714","source":"Crossref","is-referenced-by-count":11,"title":["Can Deep Learning Break a True Random Number Generator?"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9511-6871","authenticated-orcid":false,"given":"Yang","family":"Yu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0278-5986","authenticated-orcid":false,"given":"Michail","family":"Moraitis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7382-9408","authenticated-orcid":false,"given":"Elena","family":"Dubrova","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421214"},{"key":"ref38","article-title":"FPGA bitstream modification with interconnect in mind","author":"moraitis","year":"2020","journal-title":"Proc 9th Int Workshop Hardw Archit Support Security Privacy (HASP)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.573-595"},{"key":"ref32","first-page":"1803","article-title":"The unpatchable silicon: A full break of the bitstream encryption of Xilinx 7-series FPGAs","author":"ender","year":"2020","journal-title":"Proc Usenix Security Symp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134039"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43283-0_5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116222"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2399455"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"journal-title":"Project X-Ray","year":"2020","key":"ref34"},{"key":"ref10","article-title":"Why deep learning makes it difficult to keep secrets in FPGAs","author":"yu","year":"2020","journal-title":"Proc DYn Novel Adv Mach Learn Intell Cyber Security (DYNAMICS) Workshop"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","article-title":"Extracting secret keys from integrated circuits","volume":"13","author":"lim","year":"2005","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"article-title":"Deep learning-based FPGA function block detection method using an image-coded representation of bitstream","year":"2020","author":"chen","key":"ref12"},{"article-title":"A proposal for: Functionality classes for random number generators","year":"2011","author":"killmann","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2016.7577379"},{"key":"ref15","first-page":"163","article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","volume":"800","author":"rukhin","year":"2001","journal-title":"NIST Special Publication 800-22"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-90B"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0284"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031541"},{"key":"ref28","first-page":"115","article-title":"A testing methodology for side-channel resistance validation","volume":"7","author":"goodwill","year":"2011","journal-title":"Proc NIST Non-Invasive Attack Test Workshop"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_23"},{"journal-title":"Amazon EC2 F1 instances","year":"2017","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572251"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5356-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2435264.2435282"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4086"},{"journal-title":"Temperature-based hardware Trojan for ring-oscillator-based TRNGs","year":"2019","author":"ghandali","key":"ref9"},{"journal-title":"Pseudorandomness and Cryptographic Applications","year":"1994","author":"luby","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2019.00041"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW50202.2020.00026"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"}],"container-title":["IEEE Transactions on Circuits and Systems II: Express Briefs"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8920\/9419893\/09380494.pdf?arnumber=9380494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T01:14:27Z","timestamp":1633482867000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9380494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":39,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcsii.2021.3066338","relation":{},"ISSN":["1549-7747","1558-3791"],"issn-type":[{"type":"print","value":"1549-7747"},{"type":"electronic","value":"1558-3791"}],"subject":[],"published":{"date-parts":[[2021,5]]}}}