{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:30:03Z","timestamp":1768739403892,"version":"3.49.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T00:00:00Z","timestamp":1455926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC Discovery Grants"},{"name":"Strategic Project Grants"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2016,2,20]]},"abstract":"<jats:p>With the advent of ubiquitous computing and the Internet of Things (IoT), the security and privacy issues for various smart devices such as radio-frequency identification (RFID) tags and wireless sensor nodes are receiving increased attention from academia and industry. A number of lightweight cryptographic primitives have been proposed to provide security services for resource-constrained smart devices. As one of the core primitives, a cryptographically secure pseudorandom number generator (PRNG) plays an important role for lightweight embedded applications. The most existing PRNGs proposed for smart devices employ true random number generators as a component, which generally incur significant power consumption and gate count in hardware. In this article, we present Warbler family, a new pseudorandom number generator family based on nonlinear feedback shift registers (NLFSRs) with desirable randomness properties. The design of the Warbler family is based on the combination of modified de Bruijn blocks together with a nonlinear feedback Welch-Gong (WG) sequence generator, which enables us to precisely characterize the randomness properties and to flexibly adjust the security level of the resulting PRNG. Some criteria for selecting parameters of the Warbler family are proposed to offer the maximum level of security. Two instances of the Warbler family are also described, which feature two different security levels and are dedicated to EPC C1 Gen2 RFID tags and wireless sensor nodes, respectively. The security analysis shows that the proposed instances not only can pass the cryptographic statistical tests recommended by the EPC C1 Gen2 standard and NIST but also are resistant to the cryptanalytic attacks such as algebraic attacks, cube attacks, time-memory-data tradeoff attacks, Mihaljevi\u0107 et al.\u2019s attacks, and weak internal state and fault injection attacks. Our ASIC implementations using a 65nm CMOS process demonstrate that the proposed two lightweight instances of the Warbler family can achieve good performance in terms of speed and area and provide ideal solutions for securing low-cost smart devices.<\/jats:p>","DOI":"10.1145\/2808230","type":"journal-article","created":{"date-parts":[[2016,2,22]],"date-time":"2016-02-22T13:07:16Z","timestamp":1456146436000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices"],"prefix":"10.1145","volume":"15","author":[{"given":"Kalikinkar","family":"Mandal","sequence":"first","affiliation":[{"name":"University of Washington, Washington, USA"}]},{"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[{"name":"Robert Bosch Research and Technology Center, Pennsylvania, USA"}]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Waterloo, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,2,20]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208760"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9125-6"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.927220"},{"key":"e_1_2_1_4_1","volume-title":"James F. Dray, and San Vo.","author":"Bassham Lawrence E.","year":"2010","unstructured":"Lawrence E. Bassham , III , Andrew L. Rukhin , Juan Soto , James R. Nechvatal , Miles E. Smid , Elaine B. Barker , Stefan D. Leigh , Mark Levenson , Mark Vangel , David L. Banks , Nathanael Alan Heckert , James F. Dray, and San Vo. 2010 . SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. Gaithersburg, MD. Lawrence E. Bassham, III, Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Elaine B. Barker, Stefan D. Leigh, Mark Levenson, Mark Vangel, David L. Banks, Nathanael Alan Heckert, James F. Dray, and San Vo. 2010. SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. Gaithersburg, MD."},{"key":"e_1_2_1_5_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology (ASIACRYPT\u201900), Tatsuaki Okamoto (Ed.)","author":"Biryukov Alex","unstructured":"Alex Biryukov and Adi Shamir . 2000. Cryptanalytic time\/memory\/data tradeoffs for stream ciphers . In Advances in Cryptology (ASIACRYPT\u201900), Tatsuaki Okamoto (Ed.) . Lecture Notes in Computer Science , Vol. 1976 . Springer , Berlin , 1--13. DOI:http:\/\/dx.doi.org\/10.1007\/3-540-44448-3_1 10.1007\/3-540-44448-3_1 Alex Biryukov and Adi Shamir. 2000. Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In Advances in Cryptology (ASIACRYPT\u201900), Tatsuaki Okamoto (Ed.). Lecture Notes in Computer Science, Vol. 1976. Springer, Berlin, 1--13. DOI:http:\/\/dx.doi.org\/10.1007\/3-540-44448-3_1"},{"key":"e_1_2_1_6_1","series-title":"Lecture Notes in Computer Science","volume-title":"Spongent: A lightweight hash function. In Cryptographic Hardware and Embedded Systems (CHES\u201911), Bart Preneel and Tsuyoshi Takagi (Eds.)","author":"Bogdanov Andrey","year":"2011","unstructured":"Andrey Bogdanov , Miroslav Kneevi , Gregor Leander , Deniz Toz , Kerem Varc , and Ingrid Verbauwhede . 2011 . Spongent: A lightweight hash function. In Cryptographic Hardware and Embedded Systems (CHES\u201911), Bart Preneel and Tsuyoshi Takagi (Eds.) . Lecture Notes in Computer Science , Vol. 6917 . Springer , Berlin , 312--325. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-642-23951-9_21 10.1007\/978-3-642-23951-9_21 Andrey Bogdanov, Miroslav Kneevi, Gregor Leander, Deniz Toz, Kerem Varc, and Ingrid Verbauwhede. 2011. Spongent: A lightweight hash function. In Cryptographic Hardware and Embedded Systems (CHES\u201911), Bart Preneel and Tsuyoshi Takagi (Eds.). Lecture Notes in Computer Science, Vol. 6917. Springer, Berlin, 312--325. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-642-23951-9_21"},{"key":"e_1_2_1_7_1","volume-title":"A random number generator for application in RFID tags","author":"Che Wenyi","unstructured":"Wenyi Che , Huan Deng , Wang Tan , and Junyu Wang . 2008. A random number generator for application in RFID tags . In Networked RFID Systems and Lightweight Cryptography, Peter H. Cole and Damith C. Ranasinghe (Eds.). Springer , Berlin , 279--287. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-71641-9_16 10.1007\/978-3-540-71641-9_16 Wenyi Che, Huan Deng, Wang Tan, and Junyu Wang. 2008. A random number generator for application in RFID tags. In Networked RFID Systems and Lightweight Cryptography, Peter H. Cole and Damith C. Ranasinghe (Eds.). Springer, Berlin, 279--287. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-71641-9_16"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.29"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903)","author":"Nicolas","unstructured":"Nicolas T. Courtois and Willi Meier. 2003. Algebraic attacks on stream ciphers with linear feedback . In Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903) . Springer-Verlag, Berlin, 345--359. Nicolas T. Courtois and Willi Meier. 2003. Algebraic attacks on stream ciphers with linear feedback. In Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903). Springer-Verlag, Berlin, 345--359."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088753"},{"key":"e_1_2_1_11_1","unstructured":"EPCglobal. 2015. EPC radio-frequency identification protocols generation-2 UHF RFID: Specifications for RFID air interface protocols for communications at 860 MHz - 960 MHz version 2.0.1 ratified. Retrieved from http:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/Gen2_Protocol_Standard.pdf.  EPCglobal. 2015. EPC radio-frequency identification protocols generation-2 UHF RFID: Specifications for RFID air interface protocols for communications at 860 MHz - 960 MHz version 2.0.1 ratified. Retrieved from http:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/Gen2_Protocol_Standard.pdf."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2007.4480051"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868630.1868646"},{"key":"e_1_2_1_14_1","volume-title":"Golomb and Guang Gong","author":"Solomon","year":"2004","unstructured":"Solomon W. Golomb and Guang Gong . 2004 . Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press , New York, NY. Solomon W. Golomb and Guang Gong. 2004. Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York, NY."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158480"},{"key":"e_1_2_1_16_1","volume-title":"Youssef","author":"Gong Guang","year":"2001","unstructured":"Guang Gong and Amr M . Youssef . 2001 . On welch-gong transformation sequence generators. In Selected Areas in Cryptography, Douglas R. Stinson and Stafford Tavares (Eds.). Lecture Notes in Computer Science, Vol. 2012 . Springer , Berlin, 217--232. DOI:http:\/\/dx.doi.org\/10.1007\/3-540-44983-3_16 10.1007\/3-540-44983-3_16 Guang Gong and Amr M. Youssef. 2001. On welch-gong transformation sequence generators. In Selected Areas in Cryptography, Douglas R. Stinson and Stafford Tavares (Eds.). Lecture Notes in Computer Science, Vol. 2012. Springer, Berlin, 217--232. DOI:http:\/\/dx.doi.org\/10.1007\/3-540-44983-3_16"},{"key":"e_1_2_1_17_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology (CRYPTO\u201911), Phillip Rogaway (Ed.)","author":"Guo Jian","unstructured":"Jian Guo , Thomas Peyrin , and Axel Poschmann . 2011. The PHOTON family of lightweight hash functions . In Advances in Cryptology (CRYPTO\u201911), Phillip Rogaway (Ed.) . Lecture Notes in Computer Science , Vol. 6841 . Springer , Berlin , 222--239. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-642-22792-9_13 10.1007\/978-3-642-22792-9_13 Jian Guo, Thomas Peyrin, and Axel Poschmann. 2011. The PHOTON family of lightweight hash functions. In Advances in Cryptology (CRYPTO\u201911), Phillip Rogaway (Ed.). Lecture Notes in Computer Science, Vol. 6841. Springer, Berlin, 222--239. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-642-22792-9_13"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the Conference on RFID Security.","author":"Holcomb Daniel E.","year":"2007","unstructured":"Daniel E. Holcomb , Wayne P. Burleson , and Kevin Fu . 2007 . Initial SRAM state as a fingerprint and source of true random numbers for RFID tags . In Proceedings of the Conference on RFID Security. Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. 2007. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In Proceedings of the Conference on RFID Security."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054111008738"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_2_1_21_1","series-title":"Lecture Notes in Computer Science","volume-title":"Radio Frequency Identification: Security and Privacy Issues, SiddikaBerna Ors Yalcin (Ed.)","author":"Kavun Elif Bilge","unstructured":"Elif Bilge Kavun and Tolga Yalcin . 2010. A lightweight implementation of keccak hash function for radio-frequency identification applications . In Radio Frequency Identification: Security and Privacy Issues, SiddikaBerna Ors Yalcin (Ed.) . Lecture Notes in Computer Science , Vol. 6370 . Springer , Berlin , 258--269. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-642-16822-2_20 10.1007\/978-3-642-16822-2_20 Elif Bilge Kavun and Tolga Yalcin. 2010. A lightweight implementation of keccak hash function for radio-frequency identification applications. In Radio Frequency Identification: Security and Privacy Issues, SiddikaBerna Ors Yalcin (Ed.). Lecture Notes in Computer Science, Vol. 6370. Springer, Berlin, 258--269. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-642-16822-2_20"},{"key":"e_1_2_1_22_1","series-title":"Lecture Notes in Computer Science","volume-title":"Selected Areas in Cryptography, Howard Heys and Carlisle Adams (Eds.)","author":"Kelsey John","unstructured":"John Kelsey , Bruce Schneier , and Niels Ferguson . 2000. Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator . In Selected Areas in Cryptography, Howard Heys and Carlisle Adams (Eds.) . Lecture Notes in Computer Science , Vol. 1758 . Springer , Berlin , 13--33. DOI:http:\/\/dx.doi.org\/10.1007\/3-540-46513-8_2 10.1007\/3-540-46513-8_2 John Kelsey, Bruce Schneier, and Niels Ferguson. 2000. Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In Selected Areas in Cryptography, Howard Heys and Carlisle Adams (Eds.). Lecture Notes in Computer Science, Vol. 1758. Springer, Berlin, 13--33. DOI:http:\/\/dx.doi.org\/10.1007\/3-540-46513-8_2"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055626"},{"key":"e_1_2_1_24_1","unstructured":"Wolfgang Killmann and Werner Schindler. 2001. A proposal for: Functionality classes and evaluation methodology for true (Physical) random number generators version 3.1 (25.09.2001) Mathematical-technical reference of {AIS31} English translation. Retrieved from https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Zertifizierung\/Interpretationen\/AIS_31_ Functionality_classes_evaluation_methodology_for_true_RNG_e.pdf?__blob&equals;publicationFile.  Wolfgang Killmann and Werner Schindler. 2001. A proposal for: Functionality classes and evaluation methodology for true (Physical) random number generators version 3.1 (25.09.2001) Mathematical-technical reference of {AIS31} English translation. Retrieved from https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Zertifizierung\/Interpretationen\/AIS_31_ Functionality_classes_evaluation_methodology_for_true_RNG_e.pdf?__blob&equals;publicationFile."},{"key":"e_1_2_1_25_1","volume-title":"International Workshop on Sequence Design and Applications (IWSDA\u201905)","author":"Klapper Andrew","year":"2005","unstructured":"Andrew Klapper . 2005 . Linear complexity of finite field sequences over different fields . In International Workshop on Sequence Design and Applications (IWSDA\u201905) . Andrew Klapper. 2005. Linear complexity of finite field sequences over different fields. In International Workshop on Sequence Design and Applications (IWSDA\u201905)."},{"key":"e_1_2_1_26_1","volume-title":"The Art of Computer Programming","author":"Knuth Donald E.","unstructured":"Donald E. Knuth . 1997. The Art of Computer Programming , Volume 2 ( 3 rd ed.): Seminumerical Algorithms. Addison-Wesley Longman Publishing Co. , Boston, MA. Donald E. Knuth. 1997. The Art of Computer Programming, Volume 2 (3rd ed.): Seminumerical Algorithms. Addison-Wesley Longman Publishing Co., Boston, MA.","edition":"3"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Philip Levis and David Gay. 2009. TinyOS programming. Retrieved from http:\/\/csl.stanford.edu\/pal\/pubs\/ tos-programming-web.pdf.   Philip Levis and David Gay. 2009. TinyOS programming. Retrieved from http:\/\/csl.stanford.edu\/pal\/pubs\/ tos-programming-web.pdf.","DOI":"10.1017\/CBO9780511626609"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070453"},{"key":"e_1_2_1_30_1","series-title":"Cryptology and Information Security Series","volume-title":"Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 tags. In Volume 8: Radio Frequency Identification System Security","author":"Mandal Kalikinkar","year":"2012","unstructured":"Kalikinkar Mandal , Xinxin Fan , and Guang Gong . 2012 . Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 tags. In Volume 8: Radio Frequency Identification System Security . Cryptology and Information Security Series , Vol. 1758 . IOS Press , 73--84. DOI:http:\/\/dx.doi.org\/ 10.3233\/978-1-61499-143-4-73 10.3233\/978-1-61499-143-4-73 Kalikinkar Mandal, Xinxin Fan, and Guang Gong. 2012. Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 tags. In Volume 8: Radio Frequency Identification System Security. Cryptology and Information Security Series, Vol. 1758. IOS Press, 73--84. DOI:http:\/\/dx.doi.org\/ 10.3233\/978-1-61499-143-4-73"},{"key":"e_1_2_1_31_1","first-page":"1","article-title":"Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags","volume":"2","author":"Mandal Kalikinkar","year":"2013","unstructured":"Kalikinkar Mandal , Xinxin Fan , and Guang Gong . 2013 . Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags . International Journal of RFID Security and Cryptography (IJRFIDSC) 2 , 1 -- 4 (Mar-Dec. 2013), 82--91. Kalikinkar Mandal, Xinxin Fan, and Guang Gong. 2013. Warbler: A lightweight pseudorandom number generator for EPC C1 Gen2 passive RFID tags. International Journal of RFID Security and Cryptography (IJRFIDSC) 2, 1--4 (Mar-Dec. 2013), 82--91.","journal-title":"International Journal of RFID Security and Cryptography (IJRFIDSC)"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-013-0091-0"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2011.5994534"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252874"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894863.1894867"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/s130303816"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2011.6068666"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0107"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.12.002"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.11.013"},{"key":"e_1_2_1_42_1","volume-title":"Smart Card Handbook","author":"Rankl Wolfgang","unstructured":"Wolfgang Rankl and Wolfgang Effing . 1997. Smart Card Handbook . John Wiley & Sons , New York, NY . Wolfgang Rankl and Wolfgang Effing. 1997. Smart Card Handbook. John Wiley & Sons, New York, NY."},{"key":"e_1_2_1_43_1","volume-title":"New Stream Cipher Designs -- The eSTREAM Finalists","author":"Robshaw Matthew","unstructured":"Matthew Robshaw and Olivier Billet . 2008. New Stream Cipher Designs -- The eSTREAM Finalists . Springer-Verlag , Berlin . DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-68351-3 10.1007\/978-3-540-68351-3 Matthew Robshaw and Olivier Billet. 2008. New Stream Cipher Designs -- The eSTREAM Finalists. Springer-Verlag, Berlin. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-68351-3"},{"key":"e_1_2_1_44_1","first-page":"2","article-title":"Radio-frequency-identification security risks and challenges","volume":"6","author":"Sarma Sanjay E.","year":"2003","unstructured":"Sanjay E. Sarma , Stephen A. Weis , and Daniel Engels . 2003 a. Radio-frequency-identification security risks and challenges . Cryptobytes 6 , 1 (2003), 2 -- 9 . Sanjay E. Sarma, Stephen A. Weis, and Daniel Engels. 2003a. Radio-frequency-identification security risks and challenges. Cryptobytes 6, 1 (2003), 2--9.","journal-title":"Cryptobytes"},{"key":"e_1_2_1_45_1","volume-title":"Engels","author":"Sarma Sanjay E.","year":"2003","unstructured":"Sanjay E. Sarma , Stephen A. Weis , and Daniel W . Engels . 2003 b. RFID systems and security and privacy implications. In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201902). Springer-Verlag , London, 454--469. Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels. 2003b. RFID systems and security and privacy implications. In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201902). Springer-Verlag, London, 454--469."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255635"},{"key":"e_1_2_1_47_1","volume-title":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201910)","author":"Vikram","year":"2010","unstructured":"Vikram B. Suresh and Wayne P. Burleson. 2010. Entropy extraction in metastability-based TRNG . In 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201910) . 135--140. DOI:http:\/\/dx.doi.org\/10.1109\/HST. 2010 .5513099 10.1109\/HST.2010.5513099 Vikram B. Suresh and Wayne P. Burleson. 2010. Entropy extraction in metastability-based TRNG. In 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201910). 135--140. DOI:http:\/\/dx.doi.org\/10.1109\/HST.2010.5513099"},{"key":"e_1_2_1_48_1","volume-title":"Engels","author":"Weis Stephen A.","year":"2004","unstructured":"Stephen A. Weis , Sanjay E. Sarma , Ronald L. Rivest , and Daniel W . Engels . 2004 . Security and privacy aspects of low-cost radio frequency identification systems. In Security in Pervasive Computing, Dieter Hutter, Gnter Mller, Werner Stephan, and Markus Ullmann (Eds.). Lecture Notes in Computer Science, Vol. 2802 . Springer , Berlin, 201--212. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-39881-3_18 10.1007\/978-3-540-39881-3_18 Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. 2004. Security and privacy aspects of low-cost radio frequency identification systems. In Security in Pervasive Computing, Dieter Hutter, Gnter Mller, Werner Stephan, and Markus Ullmann (Eds.). Lecture Notes in Computer Science, Vol. 2802. Springer, Berlin, 201--212. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-39881-3_18"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808230","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:41Z","timestamp":1750227161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,20]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2,20]]}},"alternative-id":["10.1145\/2808230"],"URL":"https:\/\/doi.org\/10.1145\/2808230","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,20]]},"assertion":[{"value":"2015-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}