{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T21:14:31Z","timestamp":1764364471145,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Union\u2019s Horizon 2020 research and innovation programme through the RAMSES Project","doi-asserted-by":"publisher","award":["700326"],"award-info":[{"award-number":["700326"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"CyberSec4Europe project","doi-asserted-by":"publisher","award":["830929"],"award-info":[{"award-number":["830929"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"LOCARD project","doi-asserted-by":"publisher","award":["832735"],"award-info":[{"award-number":["832735"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"publisher","award":["EP\/P011772\/1"],"award-info":[{"award-number":["EP\/P011772\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EconoMical, PsycHologicAl, and Societal Impact of RanSomware"},{"name":"EPSRC\u2019s Quantum Communications Hub","award":["EP\/T001011\/1"],"award-info":[{"award-number":["EP\/T001011\/1"]}]},{"name":"Innovate UK Industrial Strategy Challenge Fund","award":["106374\u201349229"],"award-info":[{"award-number":["106374\u201349229"]}]},{"DOI":"10.13039\/501100006041","name":"AQuRand","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006041","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2020.2988505","type":"journal-article","created":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T19:59:35Z","timestamp":1587153575000},"page":"3946-3958","source":"Crossref","is-referenced-by-count":14,"title":["On the Unbearable Lightness of FIPS 140\u20132 Randomness Tests"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9896-9308","authenticated-orcid":false,"given":"Darren","family":"Hurley-Smith","sequence":"first","affiliation":[{"name":"Information Security Group, Royal Holloway University of London, Surrey, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4460-9331","authenticated-orcid":false,"given":"Constantinos","family":"Patsakis","sequence":"additional","affiliation":[{"name":"Department of Technology Education and Digital Systems, University of Piraeus, Piraeus, Greece"}]},{"given":"Julio","family":"Hernandez-Castro","sequence":"additional","affiliation":[{"name":"School of Computing, University of Kent, Canterbury, U.K."}]}],"member":"263","reference":[{"key":"ref31","first-page":"18","article-title":"On independence and sensitivity of statistical randomness tests","author":"turan","year":"2008","journal-title":"Proc Int Conf Sequences Their Appl"},{"key":"ref30","first-page":"52","article-title":"A general method to evaluate the correlation of randomness tests","author":"fan","year":"2013","journal-title":"Proc Int Workshop Inf Secur Appl"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2010.56"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_17"},{"key":"ref13","first-page":"319","article-title":"On the practical exploitability of dual EC in TLS implementations","author":"checkoway","year":"2014","journal-title":"Proc 23rd USENIX Secur Symposium USENIX Secur"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-29"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243756"},{"journal-title":"AIS 31 Functionality classes and evaluation methodology for true (physical) random number generators version 3 1","year":"2001","author":"killmann","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2018.8400697"},{"journal-title":"Trezor Hardware Wallet Random Number Generator (RNG) Tests","year":"2014","key":"ref18"},{"journal-title":"RedHat Customer Portal&#x2014;3 4 Using the Random Number Generator","year":"2019","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2012.01.011"},{"key":"ref4","first-page":"3","article-title":"A current view of random number generators","author":"marsaglia","year":"1985","journal-title":"Computer Science and Statistics Proc 16th Symp on the Interface"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_47"},{"journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","year":"2001","author":"rukhin","key":"ref3"},{"journal-title":"Diehard","year":"2018","author":"brown","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911156"},{"journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","year":"2010","author":"rukhin","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1587\/nolta.5.101"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.44"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581572"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"journal-title":"ENT A Pseudorandom Number Sequence Test Program","year":"2008","author":"walker","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77535-5_17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777342"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.45"},{"journal-title":"InfNoise Color Map and Scatterplot Scripts","year":"2018","author":"van wandelen","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"ref25","first-page":"514","article-title":"Short signatures from the Weil pairing","author":"boneh","year":"2001","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09069949.pdf?arnumber=9069949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T19:45:00Z","timestamp":1671479100000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9069949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.2988505","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2022]]}}}