{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:12:42Z","timestamp":1774631562292,"version":"3.50.1"},"reference-count":119,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Ministry of Education and Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,7,31]]},"abstract":"<jats:p>Random numbers are an essential input to many functions on the Internet of Things (IoT). Common use cases of randomness range from low-level packet transmission to advanced algorithms of artificial intelligence as well as security and trust, which heavily rely on unpredictable random sources. In the constrained IoT, though, unpredictable random sources are a challenging desire due to limited resources, deterministic real-time operations, and frequent lack of a user interface.<\/jats:p>\n          <jats:p>In this article, we revisit the generation of randomness from the perspective of an IoT operating system (OS) that needs to support general purpose or crypto-secure random numbers. We analyze the potential attack surface, derive common requirements, and discuss the potentials and shortcomings of current IoT OSs. A systematic evaluation of current IoT hardware components and popular software generators based on well-established test suits and on experiments for measuring performance give rise to a set of clear recommendations on how to build such a random subsystem and which generators to use.<\/jats:p>","DOI":"10.1145\/3453159","type":"journal-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T16:48:08Z","timestamp":1626194888000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["A Guideline on Pseudorandom Number Generation (PRNG) in the IoT"],"prefix":"10.1145","volume":"54","author":[{"given":"Peter","family":"Kietzmann","sequence":"first","affiliation":[{"name":"HAW Hamburg, Germany"}]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Germany"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake 3rd J. Schiller and S. Crocker. 2005. Randomness Requirements for Security. RFC 4086. IETE.  D. Eastlake 3rd J. Schiller and S. Crocker. 2005. Randomness Requirements for Security. RFC 4086. IETE.","DOI":"10.17487\/rfc4086"},{"key":"e_1_2_2_2_1","unstructured":"Amazon Web Services. 2020. FreeRTOS Real-time operating system for microcontrollers. Retrieved from https:\/\/www.freertos.org\/.  Amazon Web Services. 2020. FreeRTOS Real-time operating system for microcontrollers. Retrieved from https:\/\/www.freertos.org\/."},{"key":"e_1_2_2_3_1","volume-title":"\u201cCrypto","author":"Security Android Developers","year":"2016"},{"key":"e_1_2_2_4_1","unstructured":"Apache Software Foundation. 2020. Apache Mynewt. Retrieved from https:\/\/mynewt.apache.org.  Apache Software Foundation. 2020. Apache Mynewt. Retrieved from https:\/\/mynewt.apache.org."},{"key":"e_1_2_2_5_1","unstructured":"D. F. Aranha C. P. L. Gouv\u00eaa T. Markmann R. S. Wahby and K. Liao. 2020. RELIC is an Efficient LIbrary for Cryptography. Retrieved from https:\/\/github.com\/relic-toolkit\/relic.  D. F. Aranha C. P. L. Gouv\u00eaa T. Markmann R. S. Wahby and K. Liao. 2020. RELIC is an Efficient LIbrary for Cryptography. Retrieved from https:\/\/github.com\/relic-toolkit\/relic."},{"key":"e_1_2_2_6_1","unstructured":"ARM Ltd.2020. Mbed OS. Retrieved from https:\/\/www.mbed.com.  ARM Ltd.2020. Mbed OS. Retrieved from https:\/\/www.mbed.com."},{"key":"e_1_2_2_7_1","unstructured":"ARM Ltd.2020. Mbed TLS. Retrieved from https:\/\/tls.mbed.org.  ARM Ltd.2020. Mbed TLS. Retrieved from https:\/\/tls.mbed.org."},{"key":"e_1_2_2_8_1","unstructured":"ARM Ltd.2020. TrustZone for Cortex-M. Retrieved from https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone\/trustzone-for-cortex-m.  ARM Ltd.2020. TrustZone for Cortex-M. Retrieved from https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone\/trustzone-for-cortex-m."},{"key":"e_1_2_2_9_1","article-title":"Generating Random Secrets: ATSHA204A, ATECC108A, and ATECC508A","author":"Atmel","year":"2015","journal-title":"Atmel. Rev. 8843B."},{"key":"e_1_2_2_10_1","first-page":"15","article-title":"AT86RF233 Low Power, 2.4GHz Transceiver for ZigBee, RF4CE","volume":"802","author":"Atmel","year":"2017","journal-title":"IEEE"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2815038"},{"key":"e_1_2_2_12_1","volume-title":"Schmidt","author":"Baccelli Emmanuel","year":"2013"},{"key":"e_1_2_2_14_1","doi-asserted-by":"crossref","unstructured":"E. B. Barker and J. M. Kelsey. 2012. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Special Publication NIST SP 800-90A. National Inst. of Standards & Technology Gaithersburg MD.  E. B. Barker and J. M. Kelsey. 2012. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Special Publication NIST SP 800-90A. National Inst. of Standards & Technology Gaithersburg MD.","DOI":"10.6028\/NIST.SP.800-90a"},{"key":"e_1_2_2_15_1","volume-title":"Kelsey","author":"Barker Elaine B.","year":"2016"},{"key":"e_1_2_2_16_1","first-page":"800","article-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"Lawrence Basshamet","year":"2010","journal-title":"Special Publication NIST SP"},{"key":"e_1_2_2_17_1","volume-title":"EUROCRYPT\u201904: Advances in Cryptology (LNCS)","author":"Bellare Mihir"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_2_2_19_1","unstructured":"Daniel Julius Bernstein. 2014. Entropy attacks! The conventional wisdom says that hash outputs can\u2019t be controlled; the conventional wisdom is simply wrong.Retrieved from https:\/\/blog.cr.yp.to\/20140205-entropy.html.  Daniel Julius Bernstein. 2014. Entropy attacks! The conventional wisdom says that hash outputs can\u2019t be controlled; the conventional wisdom is simply wrong.Retrieved from https:\/\/blog.cr.yp.to\/20140205-entropy.html."},{"key":"e_1_2_2_20_1","unstructured":"D. Blackman and S. Vigna. 2020. xoshiro\/xoroshiro generators and the PRNG shootout. Retrieved from http:\/\/prng.di.unimi.it\/.  D. Blackman and S. Vigna. 2020. xoshiro\/xoroshiro generators and the PRNG shootout. Retrieved from http:\/\/prng.di.unimi.it\/."},{"key":"e_1_2_2_21_1","unstructured":"L. Blum M. Blum and M. Shub. 1982. A Simple Secure Pseudo-random Number Generator. Technical Report. UCB\/ERL M82\/65. EECS Department University of California Berkeley. Retrieved from http:\/\/www2.eecs.berkeley.edu\/Pubs\/TechRpts\/1982\/28538.html.  L. Blum M. Blum and M. Shub. 1982. A Simple Secure Pseudo-random Number Generator. Technical Report. UCB\/ERL M82\/65. EECS Department University of California Berkeley. Retrieved from http:\/\/www2.eecs.berkeley.edu\/Pubs\/TechRpts\/1982\/28538.html."},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.72"},{"key":"e_1_2_2_23_1","doi-asserted-by":"crossref","unstructured":"C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-node Networks. RFC 7228. IETF.  C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-node Networks. RFC 7228. IETF.","DOI":"10.17487\/rfc7228"},{"key":"e_1_2_2_24_1","unstructured":"Robert G. Brown. 2020. dieharder(1) - Linux man page. Retrieved from https:\/\/linux.die.net\/man\/1\/dieharder.  Robert G. Brown. 2020. dieharder(1) - Linux man page. Retrieved from https:\/\/linux.die.net\/man\/1\/dieharder."},{"key":"e_1_2_2_25_1","volume-title":"Dieharder: A Random Number Test Suite.","author":"Brown Robert G.","year":"2019"},{"key":"e_1_2_2_26_1","unstructured":"Bushing and Marcan and Segher and Sven. 2010. Console Hacking 2010 - PS3 Epic Fail. Retrieved from https:\/\/fahrplan.events.ccc.de\/congress\/2010\/Fahrplan\/attachments\/1780_27c3_console_hacking_2010.pdf.  Bushing and Marcan and Segher and Sven. 2010. Console Hacking 2010 - PS3 Epic Fail. Retrieved from https:\/\/fahrplan.events.ccc.de\/congress\/2010\/Fahrplan\/attachments\/1780_27c3_console_hacking_2010.pdf."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2698019"},{"key":"e_1_2_2_29_1","unstructured":"H. Corrigan-Gibbs and S. Jana. 2015. Recommendations for randomness in the operating system or how to keep evil children out of your pool and other random facts. In HotOS XV. USENIX Association Berkeley CA 25.  H. Corrigan-Gibbs and S. Jana. 2015. Recommendations for randomness in the operating system or how to keep evil children out of your pool and other random facts. In HotOS XV. USENIX Association Berkeley CA 25."},{"key":"e_1_2_2_30_1","doi-asserted-by":"crossref","unstructured":"C. Cremerset al.2020. Randomness improvements for security protocols. RFC 8937. IETF.  C. Cremerset al.2020. Randomness improvements for security protocols. RFC 8937. IETF.","DOI":"10.17487\/RFC8937"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2016-016"},{"key":"e_1_2_2_33_1","volume-title":"EUROCRYPT\u201902: Advances in Cryptology (LNCS)","author":"Desai Anand"},{"key":"e_1_2_2_34_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security. ACM, New York NY, 647\u2013658","author":"Dodis Y."},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315304"},{"key":"e_1_2_2_36_1","doi-asserted-by":"crossref","unstructured":"V. Dukhovni. 2014. Opportunistic Security: Some Protection Most of the Time. RFC 7435. IETF.  V. Dukhovni. 2014. Opportunistic Security: Some Protection Most of the Time. RFC 7435. IETF.","DOI":"10.17487\/rfc7435"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_2_2_38_1","volume-title":"Cryptography Engineering: Design Principles and Practical Applications","author":"Ferguson Niels","year":"2010"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2019.2951222"},{"key":"e_1_2_2_40_1","volume-title":"Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks. IEEE, 1\u20137.","author":"Francillon A."},{"key":"e_1_2_2_41_1","volume-title":"Proceedings of the 5th IEEE World Forum on Internet of Things (WF-IoT\u201919)","author":"Michael Freyet"},{"key":"e_1_2_2_42_1","volume-title":"Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java","author":"Galbreath Nick"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2654506"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012652"},{"key":"e_1_2_2_45_1","volume-title":"EUROCRYPT\u201988: Advances in Cryptology (LNCS)","author":"Girault Marc"},{"key":"e_1_2_2_46_1","unstructured":"Ian Goldberg and David Wagner. 1996. Randomness and the Netscape Browser. Retrieved from https:\/\/people.eecs.berkeley.edu\/ daw\/papers\/ddj-netscape.html.  Ian Goldberg and David Wagner. 1996. Randomness and the Netscape Browser. Retrieved from https:\/\/people.eecs.berkeley.edu\/ daw\/papers\/ddj-netscape.html."},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10654-016-0149-3"},{"key":"e_1_2_2_48_1","volume-title":"Proceedings of the 19th IFIP Networking Conference. IEEE Press","author":"Cenk G\u00fcndoganet"},{"key":"e_1_2_2_49_1","volume-title":"Proceedings of the 7th USENIX Security Symposium. USENIX Association","author":"Gutmann Peter","year":"1998"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"e_1_2_2_51_1","doi-asserted-by":"crossref","unstructured":"D. Harkins and D. Carrel. 1998. The Internet Key Exchange (IKE). RFC 2409. IETF.  D. Harkins and D. Carrel. 1998. The Internet Key Exchange (IKE). RFC 2409. IETF.","DOI":"10.17487\/rfc2409"},{"key":"e_1_2_2_52_1","unstructured":"Intel Corporation. 2017. TinyCrypt Cryptographic Library. Retrieved from https:\/\/github.com\/intel\/tinycrypt 07-17-2020.  Intel Corporation. 2017. TinyCrypt Cryptographic Library. Retrieved from https:\/\/github.com\/intel\/tinycrypt 07-17-2020."},{"key":"e_1_2_2_53_1","volume-title":"Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT\u201914)","author":"Kaplan D."},{"key":"e_1_2_2_54_1","volume-title":"Proceedings of the 6th Workshop on Selected Areas in Cryptography. Springer, 13\u201333","author":"Kelsey John","year":"1999"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69710-1_12"},{"key":"e_1_2_2_56_1","volume-title":"Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN\u201921)","author":"Kietzmann P."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210805"},{"key":"e_1_2_2_59_1","volume-title":"The Art of Computer Programming","author":"Knuth Donald E."},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024696"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"e_1_2_2_62_1","unstructured":"P. L\u2019Ecuyer and R. Simard. 2013. TestU01 A Software Library in ANSI C for Empirical Testing of Random Number Generators. User\u2019s guide compact version. Technical Report. Department of CS and Oper. Research University of Montreal Canada.  P. L\u2019Ecuyer and R. Simard. 2013. TestU01 A Software Library in ANSI C for Empirical Testing of Random Number Generators. User\u2019s guide compact version. Technical Report. Department of CS and Oper. Research University of Montreal Canada."},{"key":"e_1_2_2_63_1","volume-title":"Proceedings of the 2nd Symposium on Large Scale Digital Computing Machinery","author":"Lehmer Derrick H.","year":"1951"},{"key":"e_1_2_2_65_1","unstructured":"Arjen K. Lenstra James P. Hughes Maxime Augier Joppe W. Bos Thorsten Kleinjung and Christophe Wachter. 2012. Ron was wrong Whit is right. Retrieved from https:\/\/eprint.iacr.org\/2012\/064.  Arjen K. Lenstra James P. Hughes Maxime Augier Joppe W. Bos Thorsten Kleinjung and Christophe Wachter. 2012. Ron was wrong Whit is right. Retrieved from https:\/\/eprint.iacr.org\/2012\/064."},{"key":"e_1_2_2_66_1","unstructured":"Libsodium Community. 2020. A modern portable easy to use crypto library. Retrieved from https:\/\/github.com\/jedisct1\/libsodium.  Libsodium Community. 2020. A modern portable easy to use crypto library. Retrieved from https:\/\/github.com\/jedisct1\/libsodium."},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.61.1.25"},{"key":"e_1_2_2_68_1","unstructured":"George Marsaglia. 1995. The Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness. Retrieved from https:\/\/web.archive.org\/web\/20160125103112http:\/\/stat.fsu.edu\/pub\/diehard.  George Marsaglia. 1995. The Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness. Retrieved from https:\/\/web.archive.org\/web\/20160125103112http:\/\/stat.fsu.edu\/pub\/diehard."},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v008.i14"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/358407.358427"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"e_1_2_2_72_1","article-title":"ATECC508A Crypto Authentication Device Complete Data Sheet","author":"Microchip","year":"2017","journal-title":"Microchip. Rev. A.http:\/\/datasheetlookup.com\/microchip\/atecc508a-complete-data-sheet."},{"key":"e_1_2_2_73_1","unstructured":"Microchip Technology. 2020. CryptoAuthLib \u2013 Microchip CryptoAuthentication Library. Retrieved from https:\/\/github.com\/MicrochipTech\/cryptoauthlib.  Microchip Technology. 2020. CryptoAuthLib \u2013 Microchip CryptoAuthentication Library. Retrieved from https:\/\/github.com\/MicrochipTech\/cryptoauthlib."},{"key":"e_1_2_2_74_1","doi-asserted-by":"crossref","volume-title":"Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis","author":"Mitzenmacher Michael","DOI":"10.1017\/CBO9780511813603"},{"key":"e_1_2_2_75_1","unstructured":"Monocypher Authors. 2020. Boring crypto that simply works. Retrieved from https:\/\/monocypher.org\/.  Monocypher Authors. 2020. Boring crypto that simply works. Retrieved from https:\/\/monocypher.org\/."},{"key":"e_1_2_2_76_1","unstructured":"Musl. 2020. musl libc a new libc striving to be fast simple lightweight free and correct. Retrieved from https:\/\/wiki.musl-libc.org\/.  Musl. 2020. musl libc a new libc striving to be fast simple lightweight free and correct. Retrieved from https:\/\/wiki.musl-libc.org\/."},{"key":"e_1_2_2_77_1","volume-title":"Digital Signature Standard. Federal Information Processing Standards 186\u20131","author":"NIST."},{"key":"e_1_2_2_78_1","volume-title":"Security Requirements for Cryptographic Modules. Federal Information Processing Standards 140\u20131","author":"NIST."},{"key":"e_1_2_2_79_1","volume-title":"Security Requirements for Cryptographic Modules. Federal Information Processing Standards 140\u20132","author":"NIST."},{"key":"e_1_2_2_80_1","volume-title":"Digital Signature Standard. Federal Information Processing Standards 186\u20133","author":"NIST."},{"key":"e_1_2_2_81_1","volume-title":"Digital Signature Standard. Federal Information Processing Standard 186\u20134","author":"NIST."},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496711.1496724"},{"key":"e_1_2_2_83_1","unstructured":"Nordic Semiconductor 2018. nRF52840 Product Specification. Nordic Semiconductor. Version 1.0.  Nordic Semiconductor 2018. nRF52840 Product Specification. Nordic Semiconductor. Version 1.0."},{"key":"e_1_2_2_84_1","unstructured":"NXP 2016. MKW2xD Reference Manual. NXP. Rev. 3.  NXP 2016. MKW2xD Reference Manual. NXP. Rev. 3."},{"key":"e_1_2_2_85_1","unstructured":"OpenISA Community. 2020. OpenISA VEGAboard. Retrieved from https:\/\/open-isa.org\/.  OpenISA Community. 2020. OpenISA VEGAboard. Retrieved from https:\/\/open-isa.org\/."},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/63039.63042"},{"key":"e_1_2_2_87_1","first-page":"918","article-title":"Monte Carlo methods for index computation","volume":"32","author":"Pollard J. M.","year":"1978","journal-title":"Math. of Comput."},{"key":"e_1_2_2_88_1","volume-title":"Proceedings of the 44th European Solid-state Circuits and Devices Conference. IEEE","author":"Mr Antonio Pulliniet"},{"key":"e_1_2_2_89_1","unstructured":"PULP 2018. zero-riscy: User Manual. PULP Platform. Retrieved from https:\/\/www.pulp-platform.org\/docs\/user_manual.pdf. Rev. 0.2.  PULP 2018. zero-riscy: User Manual. PULP Platform. Retrieved from https:\/\/www.pulp-platform.org\/docs\/user_manual.pdf. Rev. 0.2."},{"key":"e_1_2_2_90_1","unstructured":"PULP 2018. \n   RI5CY: User Manual. PULP Platform. Retrieved from https:\/\/www.pulp-platform.org\/docs\/ri5cy_user_manual.pdf. Rev. 4.0.  \u2014 2019. RI5CY: User Manual. PULP Platform. Retrieved from https:\/\/www.pulp-platform.org\/docs\/ri5cy_user_manual.pdf. Rev. 4.0."},{"key":"e_1_2_2_91_1","doi-asserted-by":"crossref","unstructured":"E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.  E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.","DOI":"10.17487\/rfc6347"},{"key":"e_1_2_2_92_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium. Internet Society, 18","author":"Ristenpart Thomas","year":"2010"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3362053.3363495"},{"key":"e_1_2_2_94_1","first-page":"1242","article-title":"Hardware-efficient post-processing architectures for true random number generators","volume":"66","author":"Roz\u0306i\u0107 Vladimir","year":"2019","journal-title":"IEEE Trans. Circ. Syst. II: Expr. Briefs"},{"key":"e_1_2_2_95_1","unstructured":"Mutsuo Saito and Makoto Matsumot. 2011. Tiny Mersenne Twister (TinyMT): A small-sized variant of Mersenne Twister. Retrieved from http:\/\/www.math.sci.hiroshima-u.ac.jp\/ m-mat\/MT\/TINYMT.  Mutsuo Saito and Makoto Matsumot. 2011. Tiny Mersenne Twister (TinyMT): A small-sized variant of Mersenne Twister. Retrieved from http:\/\/www.math.sci.hiroshima-u.ac.jp\/ m-mat\/MT\/TINYMT."},{"key":"e_1_2_2_97_1","volume-title":"Proceedings of the 27th International Conference on Power and Timing Optimization and Simulation. IEEE, NJ, 1\u20138.","author":"Pasquale Davide"},{"key":"e_1_2_2_98_1","volume-title":"Proceedings of the Design, Automation Test in Europe Conference Exhibition. IEEE, 1319\u20131324","author":"Schrijen Geert-Jan"},{"key":"e_1_2_2_99_1","doi-asserted-by":"crossref","unstructured":"G. Selanderet al.2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.  G. Selanderet al.2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.","DOI":"10.17487\/RFC8613"},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/357353.357357"},{"key":"e_1_2_2_101_1","volume-title":"A mathematical theory of communication. Bell Syst. J. 27 (July\/Oct","author":"Shannon C. E.","year":"1948"},{"key":"e_1_2_2_102_1","unstructured":"Dan Shumow and Niels Ferguson. 2007. On the Possibility of a Back Door in the NIST SP800-90 Dual EC PRNG. Retrieved from http:\/\/rump2007.cr.yp.to\/15-shumow.pdf.  Dan Shumow and Niels Ferguson. 2007. On the Possibility of a Back Door in the NIST SP800-90 Dual EC PRNG. Retrieved from http:\/\/rump2007.cr.yp.to\/15-shumow.pdf."},{"key":"e_1_2_2_103_1","volume-title":"Cryptography and Network Security","author":"Stallings William","edition":"6"},{"key":"e_1_2_2_104_1","volume-title":"Advances in Cryptology (CRYPTO\u201917)","author":"Stevens Marc"},{"key":"e_1_2_2_105_1","unstructured":"STMicroelectronics 2018. STM32F410 Advanced Arm-based 32-bit MCUs. STMicroelectronics. Rev. 3.  STMicroelectronics 2018. STM32F410 Advanced Arm-based 32-bit MCUs. STMicroelectronics. Rev. 3."},{"key":"e_1_2_2_106_1","unstructured":"STMicroelectronics 2019. Introduction to STM32 Microcontrollers Security. STMicroelectronics. Rev. 3.  STMicroelectronics 2019. Introduction to STM32 Microcontrollers Security. STMicroelectronics. Rev. 3."},{"key":"e_1_2_2_107_1","volume-title":"SPACE\u201914: Security, Privacy, and Applied Cryptography Engineering","author":"S\u00fds Marek"},{"key":"e_1_2_2_108_1","unstructured":"Texas Instruments. 2013. CC2538 System-on-Chip Solution for 2.4-GHz IEEE 802.15.4 and ZigBee\/ZigBee IP Applications.  Texas Instruments. 2013. CC2538 System-on-Chip Solution for 2.4-GHz IEEE 802.15.4 and ZigBee\/ZigBee IP Applications."},{"key":"e_1_2_2_109_1","volume-title":"Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT\u201920)","author":"Tillmanns J."},{"key":"e_1_2_2_110_1","unstructured":"H. Tschofenig and T. Fossati. 2016. Transport Layer Security (TLS) \/ Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. RFC 7925. IETF.  H. Tschofenig and T. Fossati. 2016. Transport Layer Security (TLS) \/ Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. RFC 7925. IETF."},{"key":"e_1_2_2_111_1","unstructured":"Meltem S\u00f6nmez Turan Elaine B. Barker John M. Kelsey Kerry A. McKay Mary L. Baish and Mike Boyle. 2018. Recommendation for the Entropy Sources Used for Random Bit Generation. Special Publication NIST SP 800-90B.  Meltem S\u00f6nmez Turan Elaine B. Barker John M. Kelsey Kerry A. McKay Mary L. Baish and Mike Boyle. 2018. Recommendation for the Entropy Sources Used for Random Bit Generation. Special Publication NIST SP 800-90B."},{"key":"e_1_2_2_112_1","volume-title":"Proceedings of the 3rd International Workshop on Trustworthy Embedded Devices (TrustED\u201913)","author":"Anthony"},{"key":"e_1_2_2_113_1","first-page":"59","article-title":"An experimental exploration of Marsaglia\u2019s xorshift generators, scrambled","volume":"26","author":"Vigna Sebastiano","year":"2016","journal-title":"ACM Trans. Math. Softw."},{"key":"e_1_2_2_114_1","volume-title":"C","author":"Vigna S.","year":"2017"},{"key":"e_1_2_2_115_1","unstructured":"Corinna Vinschen and Jeff Johnston. 2020. Newlib C library. Retrieved from https:\/\/sourceware.org\/newlib\/.  Corinna Vinschen and Jeff Johnston. 2020. Newlib C library. Retrieved from https:\/\/sourceware.org\/newlib\/."},{"key":"e_1_2_2_116_1","first-page":"768","article-title":"Various techniques used in connection with random digits","volume":"5","author":"von Neumann John","year":"1951","journal-title":"J. Res. Nat. Bur. Stand. Appl. Math. Series"},{"key":"e_1_2_2_117_1","unstructured":"Malisa Vucinic Goeran Selander John Mattsson and Dan Garcia-Carillo. 2020. Requirements for a Lightweight AKE for OSCORE. Internet-Draft \u2013 work in progress 04. IETF.  Malisa Vucinic Goeran Selander John Mattsson and Dan Garcia-Carillo. 2020. Requirements for a Lightweight AKE for OSCORE. Internet-Draft \u2013 work in progress 04. IETF."},{"key":"e_1_2_2_118_1","unstructured":"John Walker. 2008. A Pseudorandom Number Sequence Test Program. Retrieved from http:\/\/www.fourmilab.ch\/random\/.  John Walker. 2008. A Pseudorandom Number Sequence Test Program. Retrieved from http:\/\/www.fourmilab.ch\/random\/."},{"key":"e_1_2_2_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2976702"},{"key":"e_1_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"e_1_2_2_121_1","unstructured":"Robin Whittle. 2005. Park-Miller-Carta Pseudo-Random Number Generator. Retrieved from http:\/\/www.firstpr.com.au\/dsp\/rand31\/.  Robin Whittle. 2005. Park-Miller-Carta Pseudo-Random Number Generator. Retrieved from http:\/\/www.firstpr.com.au\/dsp\/rand31\/."},{"key":"e_1_2_2_122_1","unstructured":"wolfSSL Inc.2020. wolfCrypt Embedded Crypto Engine. Retrieved from https:\/\/www.wolfssl.com\/products\/wolfcrypt\/.  wolfSSL Inc.2020. wolfCrypt Embedded Crypto Engine. Retrieved from https:\/\/www.wolfssl.com\/products\/wolfcrypt\/."},{"key":"e_1_2_2_123_1","volume-title":"EUROCRYPT\u201919: Advances in Cryptology (LNCS)","author":"Woodage Joanne"},{"key":"e_1_2_2_124_1","unstructured":"Zephyr Project. 2020. Zephyr. Retrieved from https:\/\/www.zephyrproject.org.  Zephyr Project. 2020. Zephyr. Retrieved from https:\/\/www.zephyrproject.org."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453159","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:39Z","timestamp":1750195719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,13]]},"references-count":119,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,7,31]]}},"alternative-id":["10.1145\/3453159"],"URL":"https:\/\/doi.org\/10.1145\/3453159","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,13]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}