{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:11:13Z","timestamp":1775067073356,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Census Bureau"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411497.3420211","type":"proceedings-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T20:59:15Z","timestamp":1604955555000},"page":"73-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Randomness Concerns when Deploying Differential Privacy"],"prefix":"10.1145","author":[{"given":"Simson L.","family":"Garfinkel","sequence":"first","affiliation":[{"name":"U.S. Census Bureau, Suitland, MD, USA"}]},{"given":"Philip","family":"Leclerc","sequence":"additional","affiliation":[{"name":"U.S. Census Bureau, Suitland, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.census.gov\/research\/data\/ restricted_use_microdata.html#CRE1 Last Accessed","author":"Microdata Restricted-Use","year":"2018","unstructured":"2018. Restricted-Use Microdata . https:\/\/www.census.gov\/research\/data\/ restricted_use_microdata.html#CRE1 Last Accessed July 14, 2018 . 2018. Restricted-Use Microdata. https:\/\/www.census.gov\/research\/data\/ restricted_use_microdata.html#CRE1 Last Accessed July 14, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Soldiers of Reason: The RAND Corporation and the Rise of the American Empire","author":"Abella Alex","unstructured":"Alex Abella . 2009. Soldiers of Reason: The RAND Corporation and the Rise of the American Empire . Mariner Books . Alex Abella. 2009. Soldiers of Reason: The RAND Corporation and the Rise of the American Empire. Mariner Books."},{"key":"e_1_3_2_1_4_1","volume-title":"Incremental Schemas, and Consistency with Public Knowledge. (Oct.","author":"Abowd John","year":"2019","unstructured":"John Abowd , Robert Ashmead , Simson Garfinkel , Daniel Kifer , Philip Leclerc , Ashwin Machanavajjhala , Brett Moran , and Pavel Zhuravlev . 2019. Census TopDown Algorithm: Differentially Private Data , Incremental Schemas, and Consistency with Public Knowledge. (Oct. 2019 ). https:\/\/github.com\/uscensusbureau\/census2020-das-2010ddp\/blob\/master\/doc\/20191020_1843_Consistency_for_Large_Scale_Differentially_Private_Histograms.pdf John Abowd, Robert Ashmead, Simson Garfinkel, Daniel Kifer, Philip Leclerc, Ashwin Machanavajjhala, Brett Moran, and Pavel Zhuravlev. 2019. Census TopDown Algorithm: Differentially Private Data, Incremental Schemas, and Consistency with Public Knowledge. (Oct. 2019). https:\/\/github.com\/uscensusbureau\/census2020-das-2010ddp\/blob\/master\/doc\/20191020_1843_Consistency_for_Large_Scale_Differentially_Private_Histograms.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"e_1_3_2_1_6_1","volume-title":"AWS Key Management Service. https:\/\/docs.aws.amazon.com\/kms\/latest\/APIReference\/API_GenerateRandom.html Last accessed","author":"Services Amazon Web","year":"2020","unstructured":"Amazon Web Services . 2020. GenerateRandom . In AWS Key Management Service. https:\/\/docs.aws.amazon.com\/kms\/latest\/APIReference\/API_GenerateRandom.html Last accessed May 18, 2020 . Amazon Web Services. 2020. GenerateRandom. In AWS Key Management Service. https:\/\/docs.aws.amazon.com\/kms\/latest\/APIReference\/API_GenerateRandom.html Last accessed May 18, 2020."},{"key":"e_1_3_2_1_7_1","unstructured":"Amazon Web Services Inc. and\/or its affiliates. 2020. Amazon EMR: Amazon EMR Release Guide. https:\/\/docs.aws.amazon.com\/emr\/latest\/ReleaseGuide\/emr-whatsnew-history.html  Amazon Web Services Inc. and\/or its affiliates. 2020. Amazon EMR: Amazon EMR Release Guide. https:\/\/docs.aws.amazon.com\/emr\/latest\/ReleaseGuide\/emr-whatsnew-history.html"},{"key":"e_1_3_2_1_8_1","volume-title":"Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)","author":"Barker Elaine","year":"2007","unstructured":"Elaine Barker and John Kelsey . 2007. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised) . National Institute of Standards and Technology . https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-90\/revised\/archive\/ 2007 -03-14 Last accessed May 30, 2020. Elaine Barker and John Kelsey. 2007. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised). National Institute of Standards and Technology. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-90\/revised\/archive\/2007-03-14 Last accessed May 30, 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"TCC 2011 (Lecture Notes in Computer Science)","volume":"6597","author":"Boneh Dan","year":"2011","unstructured":"Dan Boneh , Amit Sahai , and Brent Waters . 2011 . Functional Encryption: Definitions and Challenges. In Theory of Cryptography - 8th Theory of Cryptography Conference , TCC 2011 (Lecture Notes in Computer Science) , Vol. 6597 . Springer, 253. https:\/\/doi.org\/10.1007\/978-3-642- 19571-6_16 10.1007\/978-3-642-19571-6_16 Dan Boneh, Amit Sahai, and Brent Waters. 2011. Functional Encryption: Definitions and Challenges. In Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011 (Lecture Notes in Computer Science), Vol. 6597. Springer, 253. https:\/\/doi.org\/10.1007\/978-3-642-19571-6_16"},{"key":"e_1_3_2_1_10_1","volume-title":"Cloudflare launches decentralized service for generating random numbers. ZDNet (June 17","author":"Cimpanu Catalin","year":"2019","unstructured":"Catalin Cimpanu . 2019. Cloudflare launches decentralized service for generating random numbers. ZDNet (June 17 2019 ). https:\/\/www.zdnet.com\/article\/cloudflare-launches-decentralized-service-for-generating-random-numbers\/ Catalin Cimpanu. 2019. Cloudflare launches decentralized service for generating random numbers. ZDNet (June 17 2019). https:\/\/www.zdnet.com\/article\/cloudflare-launches-decentralized-service-for-generating-random-numbers\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Thomas Claburn. 2018. Linux 4.19 lets you declare your trust in AMD IBM and Intel. (Aug. 28 2018). https:\/\/www.theregister.com\/2018\/08\/28\/linux_419_trust\/  Thomas Claburn. 2018. Linux 4.19 lets you declare your trust in AMD IBM and Intel. (Aug. 28 2018). https:\/\/www.theregister.com\/2018\/08\/28\/linux_419_trust\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243756"},{"key":"e_1_3_2_1_13_1","volume-title":"Advisory group asks EU to consider Pentium III ban. CNN.com (Nov. 29","author":"D'Amico Mary Lisbeth","year":"1999","unstructured":"Mary Lisbeth D'Amico . 1999. Advisory group asks EU to consider Pentium III ban. CNN.com (Nov. 29 1999 ). http:\/\/www.cnn.com\/TECH\/computing\/9911\/29\/eu.p3.ban.idg\/index.html Mary Lisbeth D'Amico. 1999. Advisory group asks EU to consider Pentium III ban. CNN.com (Nov. 29 1999). http:\/\/www.cnn.com\/TECH\/computing\/9911\/29\/eu.p3.ban.idg\/index.html"},{"key":"e_1_3_2_1_14_1","volume-title":"2019 IEEE Symposium on Security and Privacy (SP). 20--38","author":"Das S.","unstructured":"S. Das , J. Werner , M. Antonakakis , M. Polychronakis , and F. Monrose . 2019. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security . In 2019 IEEE Symposium on Security and Privacy (SP). 20--38 . S. Das, J. Werner, M. Antonakakis, M. Polychronakis, and F. Monrose. 2019. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. In 2019 IEEE Symposium on Security and Privacy (SP). 20--38."},{"key":"e_1_3_2_1_15_1","volume-title":"The Cloudflare Blog (June 17","author":"Davidson Alex","year":"2019","unstructured":"Alex Davidson . 2019. The Cloudflare Blog (June 17 2019 ). https:\/\/blog.cloudflare.com\/inside-the-entropy\/ Alex Davidson. 2019. The Cloudflare Blog (June 17 2019). https:\/\/blog.cloudflare.com\/inside-the-entropy\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_29"},{"key":"e_1_3_2_1_17_1","unstructured":"Chris Doty-Humphrey. 2016. Small Fast Chaotic (SFC) 64. http:\/\/pracrand.sourceforge.net\/ Last accessed July 3 2020.  Chris Doty-Humphrey. 2016. Small Fast Chaotic (SFC) 64. http:\/\/pracrand.sourceforge.net\/ Last accessed July 3 2020."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978379"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3294052.3322188"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_22_1","unstructured":"D. Eastlake 3rd S. Crocker and J. Schiller. 1994. Randomness Recommendations for Security. RFC 1750 (Informational). http:\/\/www.ietf.org\/rfc\/rfc1750.txt Obsoleted by RFC 4086.  D. Eastlake 3rd S. Crocker and J. Schiller. 1994. Randomness Recommendations for Security. RFC 1750 (Informational). http:\/\/www.ietf.org\/rfc\/rfc1750.txt Obsoleted by RFC 4086."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake 3rd J. Schiller and S. Crocker. 2005. Randomness Requirements for Security. RFC 4086 (Best Current Practice). http:\/\/www.ietf.org\/rfc\/rfc4086.txt  D. Eastlake 3rd J. Schiller and S. Crocker. 2005. Randomness Requirements for Security. RFC 4086 (Best Current Practice). http:\/\/www.ietf.org\/rfc\/rfc4086.txt","DOI":"10.17487\/rfc4086"},{"key":"e_1_3_2_1_24_1","unstructured":"Feynman Center. 2016. Five Los Alamos innovations win R&D 100 Awards. https:\/\/www.lanl.gov\/projects\/feynman-center\/about\/news\/2016-11-15-r-and-d-awards.php  Feynman Center. 2016. Five Los Alamos innovations win R&D 100 Awards. https:\/\/www.lanl.gov\/projects\/feynman-center\/about\/news\/2016-11-15-r-and-d-awards.php"},{"key":"e_1_3_2_1_25_1","unstructured":"Simson L. Garfinkel. 2018. Modernizing Disclosure Avoidance: Report on the 2020 Disclosure Avoidance System as Implemented for the 2018 End-to-End Test. https:\/\/www.census.gov\/about\/cac\/sac\/meetings\/2017-09-meeting.html  Simson L. Garfinkel. 2018. Modernizing Disclosure Avoidance: Report on the 2020 Disclosure Avoidance System as Implemented for the 2018 End-to-End Test. https:\/\/www.census.gov\/about\/cac\/sac\/meetings\/2017-09-meeting.html"},{"key":"e_1_3_2_1_26_1","volume-title":"RDRAND implementation does not appear to check CF as required in Intel software implementation guide. Github.com (July 9","author":"Garfinkel Simson L.","year":"2020","unstructured":"Simson L. Garfinkel . 2020. RDRAND implementation does not appear to check CF as required in Intel software implementation guide. Github.com (July 9 2020 ). https:\/\/github.com\/bashtage\/randomgen\/issues\/246 Simson L. Garfinkel. 2020. RDRAND implementation does not appear to check CF as required in Intel software implementation guide. Github.com (July 9 2020). https:\/\/github.com\/bashtage\/randomgen\/issues\/246"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268949"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.01.015"},{"key":"e_1_3_2_1_29_1","volume-title":"Breaking MT19937 Crypto. https:\/\/eldipa.github.io\/book-of-gehn\/articles\/2018\/12\/23\/Mersenne-Twister-PRNG.html","year":"2018","unstructured":"Gehn. 2018 . Breaking MT19937 Crypto. https:\/\/eldipa.github.io\/book-of-gehn\/articles\/2018\/12\/23\/Mersenne-Twister-PRNG.html Gehn. 2018. Breaking MT19937 Crypto. https:\/\/eldipa.github.io\/book-of-gehn\/articles\/2018\/12\/23\/Mersenne-Twister-PRNG.html"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.49"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536464"},{"key":"e_1_3_2_1_32_1","volume-title":"When Computers Were Human","author":"Grier David Alan","unstructured":"David Alan Grier . 2007. When Computers Were Human . Princeton University Press , USA. David Alan Grier. 2007. When Computers Were Human. Princeton University Press, USA."},{"key":"e_1_3_2_1_33_1","first-page":"385","volume-title":"2006 IEEE Symposium on Security and Privacy (S P'06)","author":"Gutterman Z.","unstructured":"Z. Gutterman , B. Pinkas , and T. Reinman . 2006. Analysis of the Linux random number generator . In 2006 IEEE Symposium on Security and Privacy (S P'06) . 15 pp.-- 385 . Z. Gutterman, B. Pinkas, and T. Reinman. 2006. Analysis of the Linux random number generator. In 2006 IEEE Symposium on Security and Privacy (S P'06). 15 pp.--385."},{"key":"e_1_3_2_1_34_1","volume-title":"Cryptographic Security Architecture: Design and Verification","author":"Guttman Peter","unstructured":"Peter Guttman . 2004. Cryptographic Security Architecture: Design and Verification . Springer . Peter Guttman. 2004. Cryptographic Security Architecture: Design and Verification. Springer."},{"key":"e_1_3_2_1_35_1","volume-title":"Marson","author":"Hamburg Mike","year":"2012","unstructured":"Mike Hamburg , Paul Kocher , and Mark E . Marson . 2012 . Analysis of Intel's Ivy Bridge Digital Random Number Generator. Cryptography Research, Inc . https:\/\/web.archive.org\/web\/20141230024150\/http:\/\/www.cryptography.com\/public\/pdf\/Intel_TRNG_Report_20120312.pdf Mike Hamburg, Paul Kocher, and Mark E. Marson. 2012. Analysis of Intel's Ivy Bridge Digital Random Number Generator. Cryptography Research, Inc. https:\/\/web.archive.org\/web\/20141230024150\/http:\/\/www.cryptography.com\/public\/pdf\/Intel_TRNG_Report_20120312.pdf"},{"key":"e_1_3_2_1_36_1","volume-title":"Implementing Differential Privacy: Seven Lessons From the 2020 United States Census. Harvard Data Science Review (30 4","author":"Hawes Michael B.","year":"2020","unstructured":"Michael B. Hawes . 2020. Implementing Differential Privacy: Seven Lessons From the 2020 United States Census. Harvard Data Science Review (30 4 2020 ). https:\/\/doi.org\/10.1162\/99608f92.353c6f99 https:\/\/hdsr.mitpress.mit.edu\/pub\/dgg03vo6. 10.1162\/99608f92.353c6f99 Michael B. Hawes. 2020. Implementing Differential Privacy: Seven Lessons From the 2020 United States Census. Harvard Data Science Review (30 4 2020). https:\/\/doi.org\/10.1162\/99608f92.353c6f99 https:\/\/hdsr.mitpress.mit.edu\/pub\/dgg03vo6."},{"key":"e_1_3_2_1_37_1","volume-title":"True random numbers are here ? what that means for data centers. Network World (July 27","author":"Henry-Stocker Sandra","year":"2017","unstructured":"Sandra Henry-Stocker . 2017. True random numbers are here ? what that means for data centers. Network World (July 27 2017 ). https:\/\/www.networkworld.com\/article\/3211529\/true-random-numbers-are-here-what-this-can-mean-for-all-of-us.html Sandra Henry-Stocker. 2017. True random numbers are here ? what that means for data centers. Network World (July 27 2017). https:\/\/www.networkworld.com\/article\/3211529\/true-random-numbers-are-here-what-this-can-mean-for-all-of-us.html"},{"key":"e_1_3_2_1_38_1","volume-title":"Workshop on 2020 Census Data Products: Data Needs and Privacy Considerations. https:\/\/sites.nationalacademies.org\/dbasse\/cnstat\/dbasse_196518","author":"Hotz V. Joseph","year":"2019","unstructured":"V. Joseph Hotz , Joseph Salvo , Catherine Fitch , Daniel Goroff , Eddie Hunsinger , Linda Jacobsen , Michael McDonald , and Matthew Snipp . 2019 . Workshop on 2020 Census Data Products: Data Needs and Privacy Considerations. https:\/\/sites.nationalacademies.org\/dbasse\/cnstat\/dbasse_196518 V. Joseph Hotz, Joseph Salvo, Catherine Fitch, Daniel Goroff, Eddie Hunsinger, Linda Jacobsen, Michael McDonald, and Matthew Snipp. 2019. Workshop on 2020 Census Data Products: Data Needs and Privacy Considerations. https:\/\/sites.nationalacademies.org\/dbasse\/cnstat\/dbasse_196518"},{"key":"e_1_3_2_1_39_1","unstructured":"ID Quantique. 2020. ID Quantique and SK Telecom announce the world?s first 5G smartphone equipped with a Quantum Random Number Generator (QRNG) chipset. https:\/\/www.idquantique.com\/random-number-generation\/overview\/  ID Quantique. 2020. ID Quantique and SK Telecom announce the world?s first 5G smartphone equipped with a Quantum Random Number Generator (QRNG) chipset. https:\/\/www.idquantique.com\/random-number-generation\/overview\/"},{"key":"e_1_3_2_1_40_1","volume-title":"2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA). 219--224","author":"Inayah K.","unstructured":"K. Inayah , B. E. Sukmono , R. Purwoko , and S. Indarjani . 2013. Insertion attack effects on standard PRNGs ANSI X9.17 and ANSI X9.31 based on statistical distance tests and entropy difference tests . In 2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA). 219--224 . K. Inayah, B. E. Sukmono, R. Purwoko, and S. Indarjani. 2013. Insertion attack effects on standard PRNGs ANSI X9.17 and ANSI X9.31 based on statistical distance tests and entropy difference tests. In 2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA). 219--224."},{"key":"e_1_3_2_1_41_1","volume-title":"Supplemental ITL Bulletin for","author":"Laboratory Information Technology","year":"2013","unstructured":"Information Technology Laboratory . 2013. Supplemental ITL Bulletin for September 2013 . https:\/\/csrc.nist.gov\/csrc\/media\/publications\/shared\/documents\/itl-bulletin\/itlbul2013-09-supplemental.pdf Information Technology Laboratory. 2013. Supplemental ITL Bulletin for September 2013. https:\/\/csrc.nist.gov\/csrc\/media\/publications\/shared\/documents\/itl-bulletin\/itlbul2013-09-supplemental.pdf"},{"key":"e_1_3_2_1_42_1","volume-title":"Intel Math Kernel Library. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/tools\/math-kernel-library.html Last accessed","year":"2020","unstructured":"Intel. 2020. Intel Math Kernel Library. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/tools\/math-kernel-library.html Last accessed July 15, 2020 . Intel. 2020. Intel Math Kernel Library. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/tools\/math-kernel-library.html Last accessed July 15, 2020."},{"key":"e_1_3_2_1_43_1","volume-title":"The Linux Kernel Will Begin Sanity Checking Randomness At Boot Time. phoronix (Oct. 2","author":"Larabel Michael","year":"2019","unstructured":"Michael Larabel . 2019. Following Buggy AMD RdRand , The Linux Kernel Will Begin Sanity Checking Randomness At Boot Time. phoronix (Oct. 2 2019 ). https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Linux-RdRand-Sanity-Check Last access May 30, 2020. Michael Larabel. 2019. Following Buggy AMD RdRand, The Linux Kernel Will Begin Sanity Checking Randomness At Boot Time. phoronix (Oct. 2 2019). https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Linux-RdRand-Sanity-Check Last access May 30, 2020."},{"key":"e_1_3_2_1_44_1","volume-title":"Randomness 101: LavaRand in Production. The Cloudflare Blog (Nov. 6","author":"Liebow-Feeser Joshua","year":"2017","unstructured":"Joshua Liebow-Feeser . 2017. Randomness 101: LavaRand in Production. The Cloudflare Blog (Nov. 6 2017 ). https:\/\/blog.cloudflare.com\/randomness-101-lavarand-in-production\/ Joshua Liebow-Feeser. 2017. Randomness 101: LavaRand in Production. The Cloudflare Blog (Nov. 6 2017). https:\/\/blog.cloudflare.com\/randomness-101-lavarand-in-production\/"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231769"},{"key":"e_1_3_2_1_48_1","volume-title":"The Difference Between RDRAND and RDSEED. (Nov. 17","author":"Mechalas John P.","year":"2012","unstructured":"John P. Mechalas . 2012. The Difference Between RDRAND and RDSEED. (Nov. 17 2012 ). last accessed May 29, 2020. John P. Mechalas. 2012. The Difference Between RDRAND and RDSEED. (Nov. 17 2012). last accessed May 29, 2020."},{"key":"e_1_3_2_1_49_1","volume-title":"https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-digital-random-number-generator-drng-software-implementation-guide.html Revision 2.1","author":"Mechalas John P.","year":"2014","unstructured":"John P. Mechalas . 2018. Intel (R) Digital Random Number Generator (DRNG) Software Implementation Guide . (Oct. 17 2018). https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-digital-random-number-generator-drng-software-implementation-guide.html Revision 2.1 ; originally published on May 14, 2014 . Last accessed May 29, 2020. John P. Mechalas. 2018. Intel (R) Digital Random Number Generator (DRNG) Software Implementation Guide. (Oct. 17 2018). https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-digital-random-number-generator-drng-software-implementation-guide.html Revision 2.1; originally published on May 14, 2014. Last accessed May 29, 2020."},{"key":"e_1_3_2_1_50_1","volume-title":"The Beginning of the Monte Carlo Method. Los Alamos Science","author":"Metropolis N.","unstructured":"N. Metropolis . 1987. The Beginning of the Monte Carlo Method. Los Alamos Science , Vol. Special Issue (1987), 125-- 130 . https:\/\/library.lanl.gov\/cgi-bin\/getfile?00326866.pdf N. Metropolis. 1987. The Beginning of the Monte Carlo Method. Los Alamos Science, Vol. Special Issue (1987), 125--130. https:\/\/library.lanl.gov\/cgi-bin\/getfile?00326866.pdf"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Ilya Mironov. 2012. On Significance of the Least Significant Bits For Differential Privacy. ACM. https:\/\/www.microsoft.com\/en-us\/research\/publication\/on-significance-of-the-least-significant-bits-for-differential-privacy\/  Ilya Mironov. 2012. On Significance of the Least Significant Bits For Differential Privacy. ACM. https:\/\/www.microsoft.com\/en-us\/research\/publication\/on-significance-of-the-least-significant-bits-for-differential-privacy\/","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_1_52_1","volume-title":"29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings (Lecture Notes in Computer Science), Shai Halevi (Ed.)","volume":"5677","author":"Mironov Ilya","unstructured":"Ilya Mironov , Omkant Pandey , Omer Reingold , and Salil P. Vadhan . 2009. Computational Differential Privacy. In Advances in Cryptology - CRYPTO 2009 , 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings (Lecture Notes in Computer Science), Shai Halevi (Ed.) , Vol. 5677 . Springer, 126--142. https:\/\/doi.org\/10.1007\/978-3-642-03356-8_8 10.1007\/978-3-642-03356-8_8 Ilya Mironov, Omkant Pandey, Omer Reingold, and Salil P. Vadhan. 2009. Computational Differential Privacy. In Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings (Lecture Notes in Computer Science), Shai Halevi (Ed.), Vol. 5677. Springer, 126--142. https:\/\/doi.org\/10.1007\/978-3-642-03356-8_8"},{"key":"e_1_3_2_1_53_1","volume-title":"Conference of State Legislatures. 2020","author":"National","year":"2020","unstructured":"National Conference of State Legislatures. 2020 . Differential Privacy for Census Data Explained. https:\/\/www.ncsl.org\/research\/redistricting\/differential-privacy-for-census-data-explained.aspx Last accessed May 13, 2020 . National Conference of State Legislatures. 2020. Differential Privacy for Census Data Explained. https:\/\/www.ncsl.org\/research\/redistricting\/differential-privacy-for-census-data-explained.aspx Last accessed May 13, 2020."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15)","author":"Naveed Muhammad","unstructured":"Muhammad Naveed , Seny Kamara , and Charles V. Wright . 2015. Inference Attacks on Property-Preserving Encrypted Databases . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15) . Association for Computing Machinery, New York, NY, USA, 644--655. https:\/\/doi.org\/10.1145\/2810103.2813651 10.1145\/2810103.2813651 Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference Attacks on Property-Preserving Encrypted Databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). Association for Computing Machinery, New York, NY, USA, 644--655. https:\/\/doi.org\/10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Y. Nir and A. Langley. 2018. ChaCha20 and Poly1305 for IETF Protocols. RFC 8439 (Informational). http:\/\/www.ietf.org\/rfc\/rfc8439.txt  Y. Nir and A. Langley. 2018. ChaCha20 and Poly1305 for IETF Protocols. RFC 8439 (Informational). http:\/\/www.ietf.org\/rfc\/rfc8439.txt","DOI":"10.17487\/RFC8439"},{"key":"e_1_3_2_1_56_1","volume-title":"Filed","author":"Noll Landon Curt","year":"1998","unstructured":"Landon Curt Noll , Robert Mende , and Sanjeev Sisodiya . 1998 . Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system . Filed January 29, 1996. Landon Curt Noll, Robert Mende, and Sanjeev Sisodiya. 1998. Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system. Filed January 29, 1996."},{"key":"e_1_3_2_1_57_1","volume-title":"Mersenne Twister Predictor. https:\/\/github.com\/kmyk\/mersenne-twister-predictor Last Accessed","author":"Onaka Kimiyuki","year":"2020","unstructured":"Kimiyuki Onaka . 2018. Mersenne Twister Predictor. https:\/\/github.com\/kmyk\/mersenne-twister-predictor Last Accessed May 29, 2020 . Kimiyuki Onaka. 2018. Mersenne Twister Predictor. https:\/\/github.com\/kmyk\/mersenne-twister-predictor Last Accessed May 29, 2020."},{"key":"e_1_3_2_1_58_1","volume-title":"PCG: A Family of Simple Fast Space-Efficient Statistically Good Algorithms for Random Number Generation. Technical Report HMC-CS-2014-0905","author":"O'Neill Melissa E.","year":"2014","unstructured":"Melissa E. O'Neill . 2014 . PCG: A Family of Simple Fast Space-Efficient Statistically Good Algorithms for Random Number Generation. Technical Report HMC-CS-2014-0905 . Harvey Mudd College Computer Science Department, Claremont , CA. https:\/\/www.cs.hmc.edu\/tr\/hmc-cs-2014-0905.pdf Melissa E. O'Neill. 2014. PCG: A Family of Simple Fast Space-Efficient Statistically Good Algorithms for Random Number Generation. Technical Report HMC-CS-2014-0905. Harvey Mudd College Computer Science Department, Claremont, CA. https:\/\/www.cs.hmc.edu\/tr\/hmc-cs-2014-0905.pdf"},{"key":"e_1_3_2_1_59_1","unstructured":"Oleksandr Pavlyk Mike Sarahan Andres Guzman-Ballen and Todd Tomashek. 2019. IntelPython\/mkl_random. https:\/\/github.com\/IntelPython\/mkl_random  Oleksandr Pavlyk Mike Sarahan Andres Guzman-Ballen and Todd Tomashek. 2019. IntelPython\/mkl_random. https:\/\/github.com\/IntelPython\/mkl_random"},{"key":"e_1_3_2_1_60_1","volume-title":"Government Announces Steps to Restore Confidence on Encryption Standards. (Sept. 10","author":"Perlroth Nicole","year":"2013","unstructured":"Nicole Perlroth . 2013. Government Announces Steps to Restore Confidence on Encryption Standards. (Sept. 10 2013 ). https:\/\/bits.blogs.nytimes.com\/2013\/09\/10\/government-announces-steps-to-restore-confidence-on-encryption-standards\/ Nicole Perlroth. 2013. Government Announces Steps to Restore Confidence on Encryption Standards. (Sept. 10 2013). https:\/\/bits.blogs.nytimes.com\/2013\/09\/10\/government-announces-steps-to-restore-confidence-on-encryption-standards\/"},{"key":"e_1_3_2_1_61_1","volume-title":"x86\/rdrand: Sanity-check RDRAND output https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/tip\/tip.git\/commit\/?h=x86\/cpu&id=7879fc4bdc7506d37bd67b6fc29442c53c06dfda Last accessed","author":"Petkov Borislav","year":"2020","unstructured":"Borislav Petkov . 2019. x86\/rdrand: Sanity-check RDRAND output https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/tip\/tip.git\/commit\/?h=x86\/cpu&id=7879fc4bdc7506d37bd67b6fc29442c53c06dfda Last accessed May 30, 2020 . Borislav Petkov. 2019. x86\/rdrand: Sanity-check RDRAND output https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/tip\/tip.git\/commit\/?h=x86\/cpu&id=7879fc4bdc7506d37bd67b6fc29442c53c06dfda Last accessed May 30, 2020."},{"key":"e_1_3_2_1_62_1","volume-title":"Intel Technology Journal","volume":"13","author":"Pokam Gilles","year":"2009","unstructured":"Gilles Pokam , Cristiano Pereira , Klaus Danne , Lynda Yang , Sam King , and Jesep Torrellas . 2009 . Hardware And Software Approaches For Deterministic Multi-Processor Replay Of Concurrent Programs . Intel Technology Journal , Vol. 13 (2009). Issue 4. Gilles Pokam, Cristiano Pereira, Klaus Danne, Lynda Yang, Sam King, and Jesep Torrellas. 2009. Hardware And Software Approaches For Deterministic Multi-Processor Replay Of Concurrent Programs. Intel Technology Journal, Vol. 13 (2009). Issue 4."},{"key":"e_1_3_2_1_63_1","volume-title":"Challenge 23: Clone an MT19937 RNG from its output. https:\/\/cedricvanrompay.gitlab.io\/cryptopals\/challenges\/23.html Last accessed","author":"Ptacek Thomas","year":"2020","unstructured":"Thomas Ptacek , Sean Devlin , Alex Balducci , and Marcin Wielgoszewski . 2020. Challenge 23: Clone an MT19937 RNG from its output. https:\/\/cedricvanrompay.gitlab.io\/cryptopals\/challenges\/23.html Last accessed July 8, 2020 . Thomas Ptacek, Sean Devlin, Alex Balducci, and Marcin Wielgoszewski. 2020. Challenge 23: Clone an MT19937 RNG from its output. https:\/\/cedricvanrompay.gitlab.io\/cryptopals\/challenges\/23.html Last accessed July 8, 2020."},{"key":"e_1_3_2_1_64_1","volume-title":"random -- Generate pseudo-random numbers. https:\/\/docs.python.org\/3.8\/library\/random.html Last accessed","author":"Foundation Python Software","year":"2020","unstructured":"Python Software Foundation . 2020. random -- Generate pseudo-random numbers. https:\/\/docs.python.org\/3.8\/library\/random.html Last accessed May 30, 2020 . Python Software Foundation. 2020. random -- Generate pseudo-random numbers. https:\/\/docs.python.org\/3.8\/library\/random.html Last accessed May 30, 2020."},{"key":"e_1_3_2_1_65_1","volume-title":"CrossTalk: Speculative Data Leaks Across Cores Are Real","author":"Ragab Hany","unstructured":"Hany Ragab , Alyssa Milburn , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2021. CrossTalk: Speculative Data Leaks Across Cores Are Real . In IEEE Security and Privacy. Paper=https:\/\/download.vusec.net\/papers\/crosstalk_sp21.pdf Web=https:\/\/www.vusec.net\/projects\/crosstalk Code =https:\/\/github.com\/vusec\/ridl Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2021. CrossTalk: Speculative Data Leaks Across Cores Are Real. In IEEE Security and Privacy. Paper=https:\/\/download.vusec.net\/papers\/crosstalk_sp21.pdf Web=https:\/\/www.vusec.net\/projects\/crosstalk Code=https:\/\/github.com\/vusec\/ridl"},{"key":"e_1_3_2_1_66_1","volume-title":"A Million Random Digits with 100,00 Normal Deviates","author":"RAND.","unstructured":"RAND. 1955. A Million Random Digits with 100,00 Normal Deviates . Rand Corporation . RAND. 1955. A Million Random Digits with 100,00 Normal Deviates. Rand Corporation."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1257\/pandp.20191107"},{"key":"e_1_3_2_1_68_1","first-page":"1","article-title":"SoK: Security Models for Pseudo-Random Number Generators","volume":"2017","author":"Ruhault Sylvain","year":"2017","unstructured":"Sylvain Ruhault . 2017 . SoK: Security Models for Pseudo-Random Number Generators . IACR Transactions on Symmetric Cryptology , Vol. 2017 , 1 (Mar. 2017), 506--544. https:\/\/doi.org\/10.13154\/tosc.v2017.i1.506-544 10.13154\/tosc.v2017.i1.506-544 Sylvain Ruhault. 2017. SoK: Security Models for Pseudo-Random Number Generators. IACR Transactions on Symmetric Cryptology, Vol. 2017, 1 (Mar. 2017), 506--544. https:\/\/doi.org\/10.13154\/tosc.v2017.i1.506-544","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_69_1","volume-title":"SC '11: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis. 1--12","author":"Salmon J. K.","unstructured":"J. K. Salmon , M. A. Moraes , R. O. Dror , and D. E. Shaw . 2011. Parallel random numbers: As easy as 1, 2, 3 . In SC '11: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis. 1--12 . J. K. Salmon, M. A. Moraes, R. O. Dror, and D. E. Shaw. 2011. Parallel random numbers: As easy as 1, 2, 3. In SC '11: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis. 1--12."},{"key":"e_1_3_2_1_70_1","volume-title":"Did NSA Put a Secret Backdoor in New Encryption Standard? Wired (Nov. 15","author":"Schneier Bruce","year":"2007","unstructured":"Bruce Schneier . 2007. Did NSA Put a Secret Backdoor in New Encryption Standard? Wired (Nov. 15 2007 ). https:\/\/www.wired.com\/2007\/11\/securitymatters-1115\/ Last accessed May 30, 2020. Bruce Schneier. 2007. Did NSA Put a Secret Backdoor in New Encryption Standard? Wired (Nov. 15 2007). https:\/\/www.wired.com\/2007\/11\/securitymatters-1115\/ Last accessed May 30, 2020."},{"key":"e_1_3_2_1_71_1","first-page":"209","article-title":"Chapter 7 - Leveraging Platform Weaknesses. In Hacking Web Apps. Elsevier","volume":"7","author":"Shema Mike","year":"2012","unstructured":"Mike Shema . 2012 . Chapter 7 - Leveraging Platform Weaknesses. In Hacking Web Apps. Elsevier , Chapter 7 , 209 -- 238 . https:\/\/doi.org\/10.1016\/B978-1-59-749951-4.00007--2 10.1016\/B978-1-59-749951-4.00007--2 Mike Shema. 2012. Chapter 7 - Leveraging Platform Weaknesses. In Hacking Web Apps. Elsevier, Chapter 7, 209--238. https:\/\/doi.org\/10.1016\/B978-1-59-749951-4.00007--2","journal-title":"Chapter"},{"key":"e_1_3_2_1_72_1","volume-title":"randomgen. https:\/\/pypi.org\/project\/randomgen\/ Last accessed","author":"Sheppard Kevin","year":"2020","unstructured":"Kevin Sheppard . 2020. randomgen. https:\/\/pypi.org\/project\/randomgen\/ Last accessed May 31, 2020 . Kevin Sheppard. 2020. randomgen. https:\/\/pypi.org\/project\/randomgen\/ Last accessed May 31, 2020."},{"key":"e_1_3_2_1_73_1","volume-title":"ENH: RDRAND in numpy to improve performance. https:\/\/github.com\/numpy\/numpy\/issues\/9365","author":"Sheppard Kevin","year":"2020","unstructured":"Kevin Sheppard , Nathaniel J. Smith , Ralf Gommers , Robert Kern , Victor Rodriguez , and Simson Garfinkel . 2020 . ENH: RDRAND in numpy to improve performance. https:\/\/github.com\/numpy\/numpy\/issues\/9365 Kevin Sheppard, Nathaniel J. Smith, Ralf Gommers, Robert Kern, Victor Rodriguez, and Simson Garfinkel. 2020. ENH: RDRAND in numpy to improve performance. https:\/\/github.com\/numpy\/numpy\/issues\/9365"},{"key":"e_1_3_2_1_74_1","volume-title":"EUROCRYPT (1)","author":"Shrimpton Thomas","unstructured":"Thomas Shrimpton and R. Seth Terashima . 2015. A Provable-Security Analysis of Intel's Secure Key RNG . In EUROCRYPT (1) . Springer , 77--100. https:\/\/doi.org\/10.1007\/978--3--662--46800--5_4 10.1007\/978--3--662--46800--5_4 Thomas Shrimpton and R. Seth Terashima. 2015. A Provable-Security Analysis of Intel's Secure Key RNG. In EUROCRYPT (1). Springer, 77--100. https:\/\/doi.org\/10.1007\/978--3--662--46800--5_4"},{"key":"e_1_3_2_1_76_1","unstructured":"Christopher Stillson. [n. d.]. rdrand 1.5.0. Python Package Index (Dec. 9 [n. d.]). https:\/\/pypi.org\/project\/rdrand  Christopher Stillson. [n. d.]. rdrand 1.5.0. Python Package Index (Dec. 9 [n. d.]). https:\/\/pypi.org\/project\/rdrand"},{"key":"e_1_3_2_1_77_1","volume-title":"NoXV.University Press","author":"Tippett L. H. C.","unstructured":"L. H. C. Tippett . 1927. Random Sampling Numbers: Tracts for Computers , No . XV.University Press , Cambridge . L. H. C. Tippett. 1927. Random Sampling Numbers: Tracts for Computers, No. XV.University Press, Cambridge."},{"key":"e_1_3_2_1_78_1","unstructured":"Linux Torvalds. 2013. Linux Torvalds's response. https:\/\/www.change.org\/p\/linus-torvalds-remove-rdrand-from-dev-random-4\/responses\/9066  Linux Torvalds. 2013. Linux Torvalds's response. https:\/\/www.change.org\/p\/linus-torvalds-remove-rdrand-from-dev-random-4\/responses\/9066"},{"key":"e_1_3_2_1_79_1","volume-title":"on: N.S.A. Foils Much Internet Encryption. https:\/\/news.ycombinator.com\/item?id=6336505 Last accessed","author":"Ts'o Theodore Y.","year":"2020","unstructured":"Theodore Y. Ts'o . 2013. on: N.S.A. Foils Much Internet Encryption. https:\/\/news.ycombinator.com\/item?id=6336505 Last accessed May 30, 2020 . Theodore Y. Ts'o. 2013. on: N.S.A. Foils Much Internet Encryption. https:\/\/news.ycombinator.com\/item?id=6336505 Last accessed May 30, 2020."},{"key":"e_1_3_2_1_80_1","volume-title":"random: add a config option to trust the CPU's hwrng 10531149 diffmbox. https:\/\/patchwork.kernel.org\/patch\/10531149\/ Last accessed","author":"Ts'o Theodore Y.","year":"2020","unstructured":"Theodore Y. Ts'o . 2018. random: add a config option to trust the CPU's hwrng 10531149 diffmbox. https:\/\/patchwork.kernel.org\/patch\/10531149\/ Last accessed May 30, 2020 . Theodore Y. Ts'o. 2018. random: add a config option to trust the CPU's hwrng 10531149 diffmbox. https:\/\/patchwork.kernel.org\/patch\/10531149\/ Last accessed May 30, 2020."},{"key":"e_1_3_2_1_81_1","volume-title":"2019 a. 2020 Census 2010 Demonstration Data Products Disclosure Avoidance System. https:\/\/github.com\/uscensusbureau\/census2020-das-2010ddp Last accessed","author":"US Census Bureau","year":"2020","unstructured":"US Census Bureau . 2019 a. 2020 Census 2010 Demonstration Data Products Disclosure Avoidance System. https:\/\/github.com\/uscensusbureau\/census2020-das-2010ddp Last accessed May 11, 2020 . US Census Bureau. 2019 a. 2020 Census 2010 Demonstration Data Products Disclosure Avoidance System. https:\/\/github.com\/uscensusbureau\/census2020-das-2010ddp Last accessed May 11, 2020."},{"key":"e_1_3_2_1_82_1","unstructured":"US Census Bureau. 2019 b. 2020 Census Detailed Operational Plan for: 19. Response Processing Operation (RPO). US Department of Commerce. https:\/\/www2.census.gov\/programs-surveys\/decennial\/2020\/program-management\/planning-docs\/RPO_detailed_operational_plan-v2.pdf  US Census Bureau. 2019 b. 2020 Census Detailed Operational Plan for: 19. Response Processing Operation (RPO). US Department of Commerce. https:\/\/www2.census.gov\/programs-surveys\/decennial\/2020\/program-management\/planning-docs\/RPO_detailed_operational_plan-v2.pdf"},{"issue":"4","key":"e_1_3_2_1_83_1","first-page":"1","article-title":"c. Disclosure Avoidance System for the 2010 Demonstration Data Products: Design Specification","volume":"1","author":"US Census Bureau","year":"2019","unstructured":"US Census Bureau . 2019 c. Disclosure Avoidance System for the 2010 Demonstration Data Products: Design Specification , Version 1 . 4 . 1 . Department of Commerce. https:\/\/github.com\/uscensusbureau\/census2020-das-2010ddp\/blob\/master\/doc\/2010-Demonstration-Data-Products-Disclosure-Avoidance-System-Design-Specification%20FINAL.pdf US Census Bureau. 2019 c. Disclosure Avoidance System for the 2010 Demonstration Data Products: Design Specification, Version 1.4.1. Department of Commerce. https:\/\/github.com\/uscensusbureau\/census2020-das-2010ddp\/blob\/master\/doc\/2010-Demonstration-Data-Products-Disclosure-Avoidance-System-Design-Specification%20FINAL.pdf","journal-title":"Version"},{"key":"e_1_3_2_1_84_1","volume-title":"End-to-End release. https:\/\/github.com\/uscensusbureau\/census2020-das-e2e Last accessed","author":"US Census Bureau","year":"2020","unstructured":"US Census Bureau . 2019 d. Disclosure Avoidance System for the 2020 Census , End-to-End release. https:\/\/github.com\/uscensusbureau\/census2020-das-e2e Last accessed May 11, 2020 . US Census Bureau. 2019 d. Disclosure Avoidance System for the 2020 Census, End-to-End release. https:\/\/github.com\/uscensusbureau\/census2020-das-e2e Last accessed May 11, 2020."},{"key":"e_1_3_2_1_85_1","volume-title":"Disclosure Avoidance and the 2020 Census. https:\/\/www.census.gov\/about\/policies\/privacy\/statistical_safeguards\/disclosure-avoidance-2020-census.html Last accessed","author":"US Census Bureau","year":"2020","unstructured":"US Census Bureau . 2020. Disclosure Avoidance and the 2020 Census. https:\/\/www.census.gov\/about\/policies\/privacy\/statistical_safeguards\/disclosure-avoidance-2020-census.html Last accessed May 11, 2020 . US Census Bureau. 2020. Disclosure Avoidance and the 2020 Census. https:\/\/www.census.gov\/about\/policies\/privacy\/statistical_safeguards\/disclosure-avoidance-2020-census.html Last accessed May 11, 2020."},{"key":"e_1_3_2_1_86_1","unstructured":"Sebastiano Vigna. 2020. The wrap-up on PCG generators. http:\/\/pcg.di.unimi.it\/pcg.php Last accessed June 13 2020.  Sebastiano Vigna. 2020. The wrap-up on PCG generators. http:\/\/pcg.di.unimi.it\/pcg.php Last accessed June 13 2020."},{"key":"e_1_3_2_1_87_1","first-page":"36","article-title":"Various Techniques Used in Conneciton With Random Digits","volume":"3","author":"von Neumann Jon","year":"1951","unstructured":"Jon von Neumann . 1951 . Various Techniques Used in Conneciton With Random Digits . Journal of Research, Applied Math Series , Vol. 3 (1951), 36 -- 38 . https:\/\/mcnp.lanl.gov\/pdf_files\/nbs_vonneumann.pdf Summary written by George E. Forsythe. Jon von Neumann. 1951. Various Techniques Used in Conneciton With Random Digits. Journal of Research, Applied Math Series, Vol. 3 (1951), 36--38. https:\/\/mcnp.lanl.gov\/pdf_files\/nbs_vonneumann.pdf Summary written by George E. Forsythe.","journal-title":"Journal of Research, Applied Math Series"},{"key":"e_1_3_2_1_88_1","volume-title":"2013 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). 215--224","author":"Weaver V. M.","unstructured":"V. M. Weaver , D. Terpstra , and S. Moore . 2013. Non-determinism and overcount on modern hardware performance counter implementations . In 2013 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). 215--224 . V. M. Weaver, D. Terpstra, and S. Moore. 2013. Non-determinism and overcount on modern hardware performance counter implementations. In 2013 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). 215--224."},{"key":"e_1_3_2_1_89_1","unstructured":"Michael Wertheimer. 2015. Encryption and the NSA Role in International Standards. (2015). http:\/\/www.ams.org\/notices\/201502\/rnoti-p165.pdf Note: At the time of publication Michael Wertheimer was the Director of Research at the US National Security Agency. Last Accessed May 30 2020.  Michael Wertheimer. 2015. Encryption and the NSA Role in International Standards. (2015). http:\/\/www.ams.org\/notices\/201502\/rnoti-p165.pdf Note: At the time of publication Michael Wertheimer was the Director of Research at the US National Security Agency. Last Accessed May 30 2020."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411497.3420211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":86,"alternative-id":["10.1145\/3411497.3420211","10.1145\/3411497"],"URL":"https:\/\/doi.org\/10.1145\/3411497.3420211","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}