{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:31:59Z","timestamp":1770841919564,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,17]]},"DOI":"10.1145\/2462096.2462122","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"149-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Entropy harvesting from physical sensors"],"prefix":"10.1145","author":[{"given":"Christine","family":"Hennebert","sequence":"first","affiliation":[{"name":"CEA\/LETI, Grenoble, France"}]},{"given":"Hicham","family":"Hossayni","sequence":"additional","affiliation":[{"name":"CEA\/LETI, Grenoble, France"}]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[{"name":"INRIA, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Technical Report AIS 31","year":"2001","unstructured":"Functionality classes and evaluation methodology for physical random number generators . Technical Report AIS 31 , Bonn, Germany , September 2001 . http:\/\/tinyurl.com\/9wv8dtj. Functionality classes and evaluation methodology for physical random number generators. Technical Report AIS 31, Bonn, Germany, September 2001. http:\/\/tinyurl.com\/9wv8dtj."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102148"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science 2779","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/978-3-540-45238-6_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES","author":"Barak B.","year":"2003","unstructured":"B. Barak , R. Shaltiel , and E. Tromer . True Random Number Generators Secure in a Changing Environment . In Cryptographic Hardware and Embedded Systems - CHES 2003 , Lecture Notes in Computer Science 2779 , pages 166 -- 180 , Cologne, Germany, September 2003. Springer . B. Barak, R. Shaltiel, and E. Tromer. True Random Number Generators Secure in a Changing Environment. In Cryptographic Hardware and Embedded Systems - CHES 2003, Lecture Notes in Computer Science 2779, pages 166--180, Cologne, Germany, September 2003. Springer."},{"key":"e_1_3_2_1_4_1","volume-title":"Recommendation for Cryptographic Key Generation. NIST Special Publication","author":"Barker E.","year":"2011","unstructured":"E. Barker and A. Roginsky . Recommendation for Cryptographic Key Generation. NIST Special Publication 800-133, July 2011 E. Barker and A. Roginsky. Recommendation for Cryptographic Key Generation. NIST Special Publication 800-133, July 2011"},{"key":"e_1_3_2_1_5_1","volume-title":"Aug.","author":"Barker E.","year":"2012","unstructured":"E. Barker and A. Roginsky . Recommendation for Random Bit Generator (RBG) Constructions. Draft NIST Special Publication 800-90C , Aug. 2012 . E. Barker and A. Roginsky. Recommendation for Random Bit Generator (RBG) Constructions. Draft NIST Special Publication 800-90C, Aug. 2012."},{"key":"e_1_3_2_1_6_1","volume-title":"Jan.","author":"Barker E.","year":"2012","unstructured":"E. Barker and A. Roginsky . Recommendation for the Entropy Sources Used for Random Bit Generation. Draft NIST Special Publication 800-90B , Jan. 2012 . E. Barker and A. Roginsky. Recommendation for the Entropy Sources Used for Random Bit Generation. Draft NIST Special Publication 800-90B, Jan. 2012."},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science 839","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/3-540-48658-5_13","volume-title":"Advances in Cryptology - CRYPTO '94","author":"Davis D.","year":"1994","unstructured":"D. Davis , R. Ihaka , and P. Fenstermacher . Cryptographic Randomness from Air Turbulence in Disk Drives . In Advances in Cryptology - CRYPTO '94 , Lecture Notes in Computer Science 839 , pages 114 -- 120 , Santa Barbara, CA , USA, August 1994 . Springer . D. Davis, R. Ihaka, and P. Fenstermacher. Cryptographic Randomness from Air Turbulence in Disk Drives. In Advances in Cryptology - CRYPTO '94, Lecture Notes in Computer Science 839, pages 114--120, Santa Barbara, CA, USA, August 1994. Springer."},{"key":"e_1_3_2_1_8_1","first-page":"4086","author":"Eastlake D.","year":"2005","unstructured":"D. Eastlake , J. Schiller , and S. Crocker . Randomness Requirements for Security , June 2005 . RFC 4086 . D. Eastlake, J. Schiller, and S. Crocker. Randomness Requirements for Security, June 2005. RFC 4086.","journal-title":"Randomness Requirements for Security"},{"key":"e_1_3_2_1_9_1","volume-title":"Practical Cryptography","author":"Ferguson N.","year":"2003","unstructured":"N. Ferguson and B. Schneier . Practical Cryptography . 2003 . N. Ferguson and B. Schneier. Practical Cryptography. 2003."},{"key":"e_1_3_2_1_10_1","volume-title":"TinyRNG, A Cryptographic Random Number Generator for Wireless Sensor Network Nodes. In Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, IEEE WiOpt 2007","author":"Francillon A.","year":"2007","unstructured":"A. Francillon and C. Castelluccia . TinyRNG, A Cryptographic Random Number Generator for Wireless Sensor Network Nodes. In Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, IEEE WiOpt 2007 , Limassol, Cyprus , April 2007 . IEEE. A. Francillon and C. Castelluccia. TinyRNG, A Cryptographic Random Number Generator for Wireless Sensor Network Nodes. In Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, IEEE WiOpt 2007, Limassol, Cyprus, April 2007. IEEE."},{"key":"e_1_3_2_1_11_1","volume-title":"Jannuary","author":"Goldberg I.","year":"1996","unstructured":"I. Goldberg and D. Wagner . Randomness and the Netscape browser. Dr. Dobbs Journal , Jannuary 1996 . I. Goldberg and D. Wagner. Randomness and the Netscape browser. Dr. Dobbs Journal, Jannuary 1996."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.164"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"e_1_3_2_1_14_1","first-page":"205","volume-title":"Mining Your Ps and Qs: Detection of WidespreadWeak Keys in Network Devices. In USENIX Security Symposium","author":"Heninger N.","year":"2012","unstructured":"N. Heninger , Z. Durumeric , E. Wustrow , and J. A. Halderman . Mining Your Ps and Qs: Detection of WidespreadWeak Keys in Network Devices. In USENIX Security Symposium , pages 205 -- 219 , Bellevue, WA, USA , July 2012 . USENIX. N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman. Mining Your Ps and Qs: Detection of WidespreadWeak Keys in Network Devices. In USENIX Security Symposium, pages 205--219, Bellevue, WA, USA, July 2012. USENIX."},{"key":"e_1_3_2_1_15_1","volume-title":"The Intel random number generator","author":"Jun B.","year":"1999","unstructured":"B. Jun and P. Kocher . The Intel random number generator . Cryptography Research Inc . white paper, 1999 . B. Jun and P. Kocher. The Intel random number generator. Cryptography Research Inc. white paper, 1999."},{"key":"e_1_3_2_1_16_1","volume-title":"NIST RNG Workshop","author":"Kelsey J.","year":"2004","unstructured":"J. Kelsey . Entropy sources . In NIST RNG Workshop , July 2004 . http:\/\/tinyurl.com\/6bkbwbm. J. Kelsey. Entropy sources. In NIST RNG Workshop, July 2004. http:\/\/tinyurl.com\/6bkbwbm."},{"key":"e_1_3_2_1_17_1","volume-title":"INRIA","author":"Lauradoux C.","year":"2011","unstructured":"C. Lauradoux , J. Ponge , and A. Roeck . Online Entropy Estimation for Non-Binary Sources and Applications on iPhone. Rapport de recherche RR-7663 , INRIA , June 2011 . C. Lauradoux, J. Ponge, and A. Roeck. Online Entropy Estimation for Non-Binary Sources and Applications on iPhone. Rapport de recherche RR-7663, INRIA, June 2011."},{"key":"e_1_3_2_1_18_1","volume-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"Rukhin A.","year":"2001","unstructured":"A. Rukhin and al. A statistical test suite for random and pseudorandom number generators for cryptographic applications , 2001 . A. Rukhin and al. A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2001."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998433"}],"event":{"name":"WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Budapest Hungary","acronym":"WISEC'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462122","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462096.2462122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:39Z","timestamp":1750236519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":19,"alternative-id":["10.1145\/2462096.2462122","10.1145\/2462096"],"URL":"https:\/\/doi.org\/10.1145\/2462096.2462122","relation":{},"subject":[],"published":{"date-parts":[[2013,4,17]]},"assertion":[{"value":"2013-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}