{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:11:20Z","timestamp":1730279480073,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/ivsw.2017.8031541","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T20:47:18Z","timestamp":1505422038000},"page":"31-38","source":"Crossref","is-referenced-by-count":4,"title":["Self-timed Ring based True Random Number Generator: Threat model and countermeasures"],"prefix":"10.1109","author":[{"given":"Gregoire","family":"Gimenez","sequence":"first","affiliation":[]},{"given":"Abdelkarim","family":"Cherkaoui","sequence":"additional","affiliation":[]},{"given":"Raphael","family":"Frisch","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Fesquet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/63526.63532"},{"key":"ref11","article-title":"Temporal properties of self-timed rings","author":"winstanley","year":"2001","journal-title":"editors CHARME volume 2144 of Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ASYNC.2008.16"},{"key":"ref13","article-title":"High Precision Timing using Self-timed Circuits","author":"fairbanks","year":"2009","journal-title":"University of Cambridge Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176697"},{"key":"ref4","first-page":"167","article-title":"A closer look at security in random number generators design","volume":"7275","author":"fischer","year":"2012","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref3","article-title":"AIS 31: Functionality classes and evaluation methodology for true physical) random number generators, version 2.0","author":"schindler","year":"0","journal-title":"Bundesamt fuer Sicherheit in der Informationstechnik (BSI) Bonn 2011"},{"key":"ref6","first-page":"151","article-title":"Contactless electromagnetic active attack on ring oscillator based true random number generator","volume":"7275","author":"bayon","year":"2012","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref5","first-page":"317","article-title":"The frequency injection attack on ring-oscillator-based true random number generators","volume":"5747","author":"markettos","year":"2009","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASYNC.2013.15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2374072"},{"key":"ref2","first-page":"146","article-title":"A design for a physical RNG with robust entropy estimators","volume":"5154","author":"killmann","year":"2008","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref1","first-page":"431","article-title":"Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications","volume":"2523","author":"schindler","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref9","first-page":"179","article-title":"A very high speed true random number generator with entropy assessment","author":"cherkaoui","year":"2013","journal-title":"Proceedings of the 15th International Conference on Cryptographic Hardware and Embedded Systems ser CHES'13"}],"event":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","start":{"date-parts":[[2017,7,3]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2017,7,5]]}},"container-title":["2017 IEEE 2nd International Verification and Security Workshop (IVSW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8024489\/8031534\/08031541.pdf?arnumber=8031541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T01:50:05Z","timestamp":1506995405000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8031541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ivsw.2017.8031541","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}