{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T14:57:23Z","timestamp":1655823443933},"reference-count":14,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transinf.2019inp0009","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:10:03Z","timestamp":1580508603000},"page":"292-298","source":"Crossref","is-referenced-by-count":4,"title":["New Pseudo-Random Number Generator for EPC Gen2"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Hiroshi","family":"NOMAGUCHI","sequence":"first","affiliation":[{"name":"Division of Computer Science, University of Aizu"}]},{"given":"Chunhua","family":"SU","sequence":"additional","affiliation":[{"name":"Division of Computer Science, University of Aizu"}]},{"given":"Atsuko","family":"MIYAJI","sequence":"additional","affiliation":[{"name":"Osaka University"},{"name":"Japan Advanced Institute of Science and Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID, Protocol for Communications at 860-960 MHz."},{"key":"2","unstructured":"[2] G. Yang, M.D. Aagaard, and G. Gong, \u201cEfficient hardware implementations of the Warbler pseudorandom number generator,\u201d NIST Lightweight Cryptography Workshop 2015."},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] K. Mandal, X. Fan, and G. Gong, \u201cDesign and implementation of Warbler family of lightweight pseudorandom number generators for smart devices,\u201d ACM Trans. Embedded Computing Systems, vol.15, no.1, Article 1, Feb. 2016. 10.1145\/2808230","DOI":"10.1145\/2808230"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] J. Meli\u00e0-Segu\u00ed, J. Garcia-Alfaro, and J. Herrera-Joancomart\u00ed, \u201cJ3Gen: A PRNG for low-cost passive RFID,\u201d Sensors, vol.13, no.3, pp.3816-3830, 2013. 10.3390\/s130303816","DOI":"10.3390\/s130303816"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] A. Peinado, J. Munilla, and A. F\u00faster-Sabater, \u201cEPCGen2 pseudorandom number generators: Analysis of J3Gen,\u201d Sensors, vol.14, no.4, pp.6500-6515, 2014. 10.3390\/s140406500","DOI":"10.3390\/s140406500"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] C. Paar, A. Poschmann, and M.J.B. Robshaw, \u201cNew designs in lightweight symmetric encryption,\u201d RFID Security, P. Kitsos and Y. Zhang, Eds., pp.349-371, Springer, Boston, MA, 2008. 10.1007\/978-0-387-76481-8_14","DOI":"10.1007\/978-0-387-76481-8_14"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[8] A. Juels, \u201cRFID security and privacy: A research survey,\u201d IEEE J. Sel. Areas Commun., vol.24, no.2, pp.381-394, 2006. 10.1109\/jsac.2005.861395","DOI":"10.1109\/JSAC.2005.861395"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[9] S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, \u201cSecurity and privacy aspects of low-cost radio frequency,\u201d Security in Pervasive Computing, Lecture Notes in Computer Science, vol. 2802, pp.201-212, Springer, Berlin, Heidelberg, 2004. 10.1007\/978-3-540-39881-3_18","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[10] P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, \u201cLAMED \u2014 A PRNG for EPC Class-1 Generation-2 RFID specification,\u201d Computer Standards &amp; Interfaces, vol.31, no.1, pp.88-97, Jan. 2009. 10.1016\/j.csi.2007.11.013","DOI":"10.1016\/j.csi.2007.11.013"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[11] H. Mart\u00edn, E.S. Mill\u00e1n, P. Peris-Lopez, and J.E. Tapiador, \u201cEfficient ASIC implementation and analysis of two EPC-C1G2 RFID authentication protocols,\u201d IEEE Sensors J., vol.13, no.10, pp.3537-3547 Oct. 2013. 10.1109\/jsen.2013.2270404","DOI":"10.1109\/JSEN.2013.2270404"},{"key":"11","unstructured":"[12] H. Zhang and X. Wang, Cryptanalysis of Stream Cipher Grain Family."},{"key":"12","doi-asserted-by":"publisher","unstructured":"[13] S. Kiyomoto, T. Tanaka, and K. Sakurai, \u201cExperimental analysis of guess-and-determine attacks on clock-controlled stream ciphers,\u201d IEICE Trans. Fundamentals, vol.E88-A, no.10, pp.2778-2791, Oct. 2005. 10.1093\/ietfec\/e88-a.10.2778","DOI":"10.1093\/ietfec\/e88-a.10.2778"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[14] P. Hawkes and G.G. Rose, \u201cGuess-and-determine attack on SNOW,\u201d International Workshop on Selected Areas in Cryptography, Lecture Notes in Computer Science, vol.2595, pp.37-46, Springer, Berlin, Heidelberg, 2003. 10.1007\/3-540-36492-7_4","DOI":"10.1007\/3-540-36492-7_4"},{"key":"14","unstructured":"[15] L.E. Bassham, A.L. Rukhin, J. Soto, J.R. Nechvatal, M.E. Smid, S.D. Leigh, M. Levenson, M. Vangel, N.A. Heckert, and D.L. Banks, \u201cA statistical test suite for random and pseudorandom number generators for cryptographic applications,\u201d Special Publication 800-22 Revision 1a (2014.04)."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0009\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T03:27:14Z","timestamp":1580527634000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0009\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019inp0009","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}