{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:34:21Z","timestamp":1762004061424},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/wiopt.2007.4480051","type":"proceedings-article","created":{"date-parts":[[2008,4,2]],"date-time":"2008-04-02T14:57:29Z","timestamp":1207148249000},"page":"1-7","source":"Crossref","is-referenced-by-count":43,"title":["TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes"],"prefix":"10.1109","author":[{"given":"Aurelien","family":"Francillon","sequence":"first","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"13","article-title":"Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator","author":"kelsey","year":"1999","journal-title":"Selected Areas in Cryptography number Generators"},{"journal-title":"Tiue random numbers from Wi-Fi background noise","year":"0","author":"mutaf","key":"ref11"},{"key":"ref12","article-title":"Soft tamper-proofing via program integrity verification in wireless sensor networks","author":"park","year":"2005","journal-title":"IEEE Tansaction on Mobile Computing"},{"key":"ref13","first-page":"2?20","article-title":"Pulsar Microwave Corporation","year":"0","journal-title":"Pulsar power divider"},{"journal-title":"An effcient random number generator for low-power sensor networks","year":"0","author":"seetharam","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/945511.945516"},{"key":"ref4","article-title":"Randomness extraction and key derivation usingthe CBC","author":"dodis","year":"2004","journal-title":"Cascade and HMAC modes LNCS 3152"},{"year":"0","key":"ref3"},{"article-title":"Practical Cryptography","year":"2003","author":"ferguson","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127826"},{"year":"0","key":"ref8"},{"key":"ref7","article-title":"Software generation of practically strong random numbers","author":"gutmann","year":"0","journal-title":"7th USENIXSecurity Symp"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102148"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"year":"0","key":"ref1"}],"event":{"name":"2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt)","start":{"date-parts":[[2007,4,16]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2007,4,20]]}},"container-title":["2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4479865\/4480002\/04480051.pdf?arnumber=4480051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:06:45Z","timestamp":1489676805000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4480051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2007.4480051","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}