{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T18:08:29Z","timestamp":1758823709101,"version":"3.37.3"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100006041","name":"Innovate UK","doi-asserted-by":"publisher","award":["102050 (authenticatedSelf)"],"award-info":[{"award-number":["102050 (authenticatedSelf)"]}],"id":[{"id":"10.13039\/501100006041","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"European Union\u2019s Horizon 2020 research and innovation programme","doi-asserted-by":"publisher","award":["700326 (RAMSES project)"],"award-info":[{"award-number":["700326 (RAMSES project)"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/tifs.2017.2777342","type":"journal-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T19:08:18Z","timestamp":1511464098000},"page":"1031-1041","source":"Crossref","is-referenced-by-count":13,"title":["Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9896-9308","authenticated-orcid":false,"given":"Darren","family":"Hurley-Smith","sequence":"first","affiliation":[]},{"given":"Julio","family":"Hernandez-Castro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Reverse-engineering a cryptographic RFID tag","volume":"28","author":"nohl","year":"2008","journal-title":"Proc Usenix Secur Symp"},{"key":"ref11","first-page":"1","article-title":"Cloning cryptographic RFID cards for 25 USD","author":"kasper","year":"2010","journal-title":"Proc 5th Benelux Workshop Inf Syst Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_28"},{"key":"ref13","first-page":"150","article-title":"A practical attack on patched MIFARE Classic","author":"chiu","year":"2013","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_14"},{"key":"ref16","first-page":"620","article-title":"True random number generator in RFID systems against traceability","volume":"1","author":"liu","year":"2006","journal-title":"Proc IEEE Consum Commun Netw Conf (CCNC)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2012.19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_20"},{"journal-title":"The success of MIFARE","year":"2016","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2011.6068666"},{"article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","year":"2001","author":"rukhin","key":"ref8"},{"journal-title":"Dieharder A Random Number Test Suite","year":"2013","author":"brown","key":"ref7"},{"journal-title":"Number of Oyster Cards Used for Travel","year":"2016","key":"ref2"},{"journal-title":"Adult Oyster Cards Issued 2015\/16","year":"2016","key":"ref1"},{"journal-title":"Ent A Pseudo-Random Number Sequence Testing Program","year":"2016","author":"walker","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2004.09.001"},{"journal-title":"NIST Computer Security Resource Center","year":"2016","key":"ref22"},{"key":"ref21","first-page":"123","article-title":"Bias in the Mifare DESFire EV1 TRNG","author":"hurley-smith","year":"2016","journal-title":"Proc 12th Int Workshop Radio Freq Identificat (RFIDsec)"},{"article-title":"AIS 31: Functionality classes and evaluation methodology for true (physical) random number generators, version 3.1","year":"2001","author":"killmann","key":"ref24"},{"journal-title":"A Study Entropy","year":"2016","author":"anderson","key":"ref23"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8245900\/08119578.pdf?arnumber=8119578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:23:15Z","timestamp":1642004595000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8119578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":24,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2777342","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}