{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:21:43Z","timestamp":1725794503573},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/ivsw.2017.8031540","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T20:47:18Z","timestamp":1505422038000},"page":"25-30","source":"Crossref","is-referenced-by-count":8,"title":["Entropy justification for metastability based nondeterministic random bit generator"],"prefix":"10.1109","author":[{"given":"Rachael J.","family":"Parker","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Recommendation for the Entropy Sources Used for Random Bit Generation","year":"2016","key":"ref4"},{"journal-title":"Recommendation for Block Cipher Modes of Operation Three Variants of Ciphertext Stealing for CBC Mode","year":"2010","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2010.5560296"},{"journal-title":"Recommendation for Random Bit Generator (RBC) Constructions","year":"2016","key":"ref6"},{"journal-title":"Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)","year":"2012","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2011.5995897"},{"journal-title":"Specification for the Advanced Encryption Standard (ABS)","year":"2001","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"journal-title":"Intel Digital Random Number Generator (Drng) Software Implementation Guide","year":"0","key":"ref1"}],"event":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","start":{"date-parts":[[2017,7,3]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2017,7,5]]}},"container-title":["2017 IEEE 2nd International Verification and Security Workshop (IVSW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8024489\/8031534\/08031540.pdf?arnumber=8031540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T01:21:43Z","timestamp":1506993703000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8031540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ivsw.2017.8031540","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}