{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:44Z","timestamp":1773615884430,"version":"3.50.1"},"reference-count":26,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700962","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:49Z","timestamp":1741962169000},"page":"1303-1310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Probability-Theoretical Models of Physical Random Number Generators"],"prefix":"10.3103","volume":"58","author":[{"given":"D. S.","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"A. S.","family":"Logachev","sequence":"additional","affiliation":[]},{"given":"V. O.","family":"Mironkin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7795_CR1","unstructured":"Kolmogorov, A.N., Osnovnye ponyatiya teorii veroyatnostei (Foundations of the Probability Theory), Moscow: Nauka, 1974; Dover, Mineola, NY, 2018."},{"key":"7795_CR2","doi-asserted-by":"publisher","first-page":"119","DOI":"10.31854\/1813-324X-2022-8-4-119-129","volume":"8","author":"A.V. Yarmak","year":"2022","unstructured":"Yarmak, A.V., Post-quantum cryptographic access control based on hierarchical RBAC model, Trudy Uchebnykh Zavedenii Svyazi, 2022, vol. 8, no. 4, pp. 119\u2013129. https:\/\/doi.org\/10.31854\/1813-324X-2022-8-4-119-129","journal-title":"Trudy Uchebnykh Zavedenii Svyazi"},{"key":"7795_CR3","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/81.847868","volume":"47","author":"C.S. Petrie","year":"2000","unstructured":"Petrie, C.S. and Connelly, J.A., A noise-based IC random number generator for applications in cryptography, IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., 2000, vol. 47, no. 5, pp. 615\u2013621. https:\/\/doi.org\/10.1109\/81.847868","journal-title":"IEEE Trans. Circuits Syst. I: Fundam. Theory Appl."},{"key":"7795_CR4","doi-asserted-by":"publisher","first-page":"4442","DOI":"10.1063\/1.1809295","volume":"75","author":"M. Stipcevic","year":"2004","unstructured":"Stipcevic, M., Fast nondeterministic random bit generator based on weakly correlated physical events, Rev. Sci. Instrum., 2004, vol. 75, no. 11, pp. 4442\u20134449. https:\/\/doi.org\/10.1063\/1.1809295","journal-title":"Rev. Sci. Instrum."},{"key":"7795_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3991\/ijes.v6i1.8357","volume":"6","author":"B. Rexha","year":"2018","unstructured":"Rexha, B., Imeraj, D., and Shabani, I., Using efficient TRNGs for PSEUDO profile in national eID card, International Journal of Recent Contributions from Engineering, \n               Science IT \n               (iJES), 2018, vol. 6, no. 1, pp. 57\u201373. https:\/\/doi.org\/10.3991\/ijes.v6i1.8357","journal-title":"Science IT"},{"key":"7795_CR6","unstructured":"Vasilenko, V.V., Estimating the entropy quality indexes of random pulse sequence of noise generator of M316GM1U built-in microelectronic device, Spetsial\u2019naya Tekhnika, 2016, no. 6, pp. 36\u201344."},{"key":"7795_CR7","doi-asserted-by":"publisher","first-page":"13029","DOI":"10.1364\/oe.18.013029","volume":"18","author":"M. F\u00fcrst","year":"2010","unstructured":"F\u00fcrst, M., Weier, H., Nauerth, S., Marangon, D.G., Kurtsiefer, Ch., and Weinfurter, H., High speed optical quantum random number generation, Opt. Express, 2010, vol. 18, no. 12, p. 13029. https:\/\/doi.org\/10.1364\/oe.18.013029","journal-title":"Opt. Express"},{"key":"7795_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1038\/nphoton.2009.235","volume":"4","author":"I. Kanter","year":"2010","unstructured":"Kanter, I., Aviad, Ya., Reidler, I., Cohen, E., and Rosenbluh, M., An optical ultrafast random bit generator, Nat. Photonics, 2010, vol. 4, no. 1, pp. 58\u201361. https:\/\/doi.org\/10.1038\/nphoton.2009.235","journal-title":"Nat. Photonics"},{"key":"7795_CR9","doi-asserted-by":"publisher","first-page":"51137","DOI":"10.1103\/physreve.81.051137","volume":"81","author":"H. Guo","year":"2010","unstructured":"Guo, H., Tang, W., Liu, Yu., and Wei, W., Truly random number generation based on measurement of phase noise of a laser, Phys. Rev. E, 2010, vol. 81, no. 5, p. 51137. https:\/\/doi.org\/10.1103\/physreve.81.051137","journal-title":"Phys. Rev. E"},{"key":"7795_CR10","unstructured":"Figotin, A., Vitebskiy, I., Popovich, V., et al., Random number generator based on the spontaneous alpha-decay, US Patent US20030018674A1, 2003."},{"key":"7795_CR11","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1364\/ol.36.001020","volume":"36","author":"X. Li","year":"2011","unstructured":"Li, X., Cohen, A.B., Murphy, T.E., and Roy, R., Scalable parallel physical random number generator based on a superluminescent LED, Opt. Lett., 2011, vol. 36, no. 6, pp. 1020\u20131022. https:\/\/doi.org\/10.1364\/ol.36.001020","journal-title":"Opt. Lett."},{"key":"7795_CR12","doi-asserted-by":"crossref","unstructured":"Bagini, V. and Bucci, M., A design of reliable true random number generator for cryptographic applications, Cryptographic Hardware and Embedded Systems: First International Workshop, Ko\u00e7, \u00c7.K. and Paar, C., Eds., Lecture Notes in Computer Science, vol. 1717, Berlin: Springer, 1999, pp. 204\u2013218.","DOI":"10.1007\/3-540-48059-5_18"},{"key":"7795_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/s0167-4048(04)00064-1","volume":"23","author":"J. Szczepanski","year":"2004","unstructured":"Szczepanski, J., Wajnryb, E., Amig\u00f3, J.M., Sanchez-Vives, M.V., and Slater, M., Biometric random number generators, Comput. Secur., 2004, vol. 23, no. 1, pp. 77\u201384. https:\/\/doi.org\/10.1016\/s0167-4048(04)00064-1","journal-title":"Comput. Secur."},{"key":"7795_CR14","doi-asserted-by":"publisher","unstructured":"Lampert, B., Wahby, R.S., Leonard, Sh., and Levis, P., Robust, low-cost, auditable random number generation for embedded system security, Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, Stanford, CA, 2016, New York: Association for Computing Machinery, 2016, pp. 16\u201327. https:\/\/doi.org\/10.1145\/2994551.2994568","DOI":"10.1145\/2994551.2994568"},{"key":"7795_CR15","unstructured":"Jun, B. and Kocher, P., The Intel random number generator, Cryptography Research Inc. White Paper, 1999, vol.\u00a027, pp. 1\u20138."},{"key":"7795_CR16","doi-asserted-by":"publisher","unstructured":"Stip\u010devi\u0107, M. and Ko\u00e7, \u00c7.K., True random number generators, Open Problems in Mathematics and Computational Science, Ko\u00e7, \u00c7., Ed., Cham: Springer, 2014, pp. 275\u2013315. https:\/\/doi.org\/10.1007\/978-3-319-10683-0_12","DOI":"10.1007\/978-3-319-10683-0_12"},{"key":"7795_CR17","doi-asserted-by":"publisher","first-page":"24102","DOI":"10.1103\/physrevlett.103.024102","volume":"103","author":"I. Reidler","year":"2009","unstructured":"Reidler, I., Aviad, Y., Rosenbluh, M., and Kanter, I., Ultrahigh-speed random number generation based on a chaotic semiconductor laser, Phys. Rev. Lett., 2009, vol. 103, no. 2, p. 24102. https:\/\/doi.org\/10.1103\/physrevlett.103.024102","journal-title":"Phys. Rev. Lett."},{"key":"7795_CR18","doi-asserted-by":"publisher","unstructured":"Killmann, W. and Schindler, W., A design for a physical RNG with robust entropy estimators, Cryptographic Hardware and Embedded Systems (CHES 2008), Oswald, E. and Rohatgi, P., Eds., Lecture Notes in Computer Science, vol. 5154, Berlin: Springer, 2008, pp. 146\u2013163. https:\/\/doi.org\/10.1007\/978-3-540-85053-3_10","DOI":"10.1007\/978-3-540-85053-3_10"},{"key":"7795_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.35596\/1729-7648-2021-19-4-37-42","volume":"19","author":"M.O. Pikuza","year":"2021","unstructured":"Pikuza, M.O. and Mikhnevich, S.Yu., Testing a hardware random number generator using NIST statistical test suite, Doklady Belorusskogo Gosudarstvennogo Universiteta Informatiki i Radioelektroniki, 2021, vol. 19, no. 4, pp.\u00a037\u201342. https:\/\/doi.org\/10.35596\/1729-7648-2021-19-4-37-42","journal-title":"Doklady Belorusskogo Gosudarstvennogo Universiteta Informatiki i Radioelektroniki"},{"key":"7795_CR20","doi-asserted-by":"publisher","first-page":"119568","DOI":"10.1109\/access.2023.3327325","volume":"11","author":"G. Guerrer","year":"2023","unstructured":"Guerrer, G., RAVA: An open hardware true random number generator based on avalanche noise, IEEE Access, 2023, vol. 11, pp. 119568\u2013119583. https:\/\/doi.org\/10.1109\/access.2023.3327325","journal-title":"IEEE Access"},{"key":"7795_CR21","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/tc.2007.250627","volume":"56","author":"B. Sunar","year":"2006","unstructured":"Sunar, B., Martin, W., and Stinson, D., A provably secure true random number generator with built-in tolerance to active attacks, IEEE Trans. Comput., 2006, vol. 56, no. 1, pp. 109\u2013119. https:\/\/doi.org\/10.1109\/tc.2007.250627","journal-title":"IEEE Trans. Comput."},{"key":"7795_CR22","unstructured":"Fedichev, A.V., Yarmak, A.V., and Aleksandrova, E.B., Fast performance evaluation of post-quantum cryptographic algorithms for low-power industrial internet of things devices, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2021, no. 30, pp. 47\u201348."},{"key":"7795_CR23","doi-asserted-by":"publisher","first-page":"617","DOI":"10.3367\/UFNe.2020.11.038890","volume":"64","author":"M. Arbekov","year":"2021","unstructured":"Arbekov, M. and Molotkov, S.N., Extraction of quantum randomness, Phys.-Usp., 2021, vol. 64, no. 6, p. 617. https:\/\/doi.org\/10.3367\/UFNe.2020.11.038890","journal-title":"Phys.-Usp."},{"key":"7795_CR24","unstructured":"Solovei, R.S. and Lavrova, D.S., Game-theoretic approach to securing wireless dynamic systems by self-regulation, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2020, no. 29, pp. 26\u201327."},{"key":"7795_CR25","unstructured":"Ognev, R.A. and Zhukovskii, E.V., Detecting malicious executable files by analyzing system call sequences using machine learning techniques, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2020, no.\u00a029, pp. 29\u201330."},{"key":"7795_CR26","unstructured":"Shiryaev, A.N., Veroyatnost\u2019 (Probability), Moscow: Moskovskii Tsentr Nepreryvnogo Matematicheskogo Obrazovaniya, 2004, 3rd ed., vol. 2."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700962.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700962","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700962.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:20Z","timestamp":1773612380000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7795"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700962","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"8 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}