{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T20:52:10Z","timestamp":1772052730763,"version":"3.50.1"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF) Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Korea Government","doi-asserted-by":"publisher","award":["RS-2023-00212103"],"award-info":[{"award-number":["RS-2023-00212103"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information and Communications Technology Planning and Evaluation (IITP) Grant"},{"DOI":"10.13039\/501100003621","name":"Korea Government","doi-asserted-by":"publisher","award":["2021-0-00400"],"award-info":[{"award-number":["2021-0-00400"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Development of Highly Efficient PQC Security and Performance Verification for Constrained Devices"},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["2525\/19"],"award-info":[{"award-number":["2525\/19"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3280745","type":"journal-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:32:06Z","timestamp":1685381526000},"page":"3305-3317","source":"Crossref","is-referenced-by-count":5,"title":["Generalized LRS Estimator for Min-Entropy Estimation"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9122-5691","authenticated-orcid":false,"given":"Jiheon","family":"Woo","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Pohang University of Science and Technology (POSTECH), Pohang, South Korea"}]},{"given":"Chanhee","family":"Yoo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Daegu Gyeongbuk Institute of Science and Technology (DGIST), Daegu, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4114-4935","authenticated-orcid":false,"given":"Young-Sik","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Chosun University, Gwangju, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6369-6699","authenticated-orcid":false,"given":"Yuval","family":"Cassuto","sequence":"additional","affiliation":[{"name":"Viterbi Department of Electrical and Computer Engineering, Technion&#x2013;Israel Institute of Technology, Haifa, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0120-3750","authenticated-orcid":false,"given":"Yongjune","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Pohang University of Science and Technology (POSTECH), Pohang, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-90B"},{"key":"ref2","first-page":"1","article-title":"Entropy bounds and statistical tests","volume-title":"Proc. NIST Random Bit Gener. Workshop","author":"Hagerty"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271423"},{"key":"ref5","volume-title":"A Proposal for: Functionality Classes for Random Number Generators","author":"Killmann","year":"2011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3070424"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834465"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055890"},{"key":"ref10","first-page":"547","article-title":"On measures of entropy and information","volume-title":"Proc. 4th Berkeley Symp. Math. Statist. Probab., Contrib. Theory Statist.","volume":"4","author":"R\u00e9nyi"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2947871"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511524585"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22670-0_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2432622.2432626"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973730.124"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i3.151-168"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1987.1057357"},{"key":"ref18","first-page":"266","article-title":"Sampling algorithms: Lower bounds and applications","volume-title":"Proc. Annu. ACM Symp. Theory Comput. (STOC)","author":"Bar-Yossef"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/18.923736"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541386"},{"key":"ref21","volume-title":"RANDOM.ORG","year":"2020"},{"key":"ref22","volume-title":"Ubld.it:TrueRNG","year":"2020"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10137764.pdf?arnumber=10137764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T22:33:05Z","timestamp":1710369185000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10137764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3280745","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}