skip to main content
10.1145/288090.288114acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article
Free Access

A practical secure physical random bit generator

Published:01 November 1998Publication History
First page image

References

  1. 1.AGNEW, G. B. Random sources for cryptographic systems. In Advances in Cryptology - Burocrypt '87, D. Chaum and W. L. Price, Eds., Springer Verlag, pp. 77-81. Published in Lecture Notes in Computer Science v. 304, 1988.Google ScholarGoogle Scholar
  2. 2.AT&T. T7001 random number generator. Data Sheet.Google ScholarGoogle Scholar
  3. 3.DAVIS, D., IHAKA, a., AND FENSTERMACHER, P. Cryptographic randomness from air turbulence in disk drives. In Advances in gryptology- CRYPTO '9~ (Santa Barbara, CA), Springer Verlag, pp. 114-120. Published in Lecture Notes in Computer Science v. 839. Google ScholarGoogle Scholar
  4. 4.Computing random numbers. Light headed. The Economist (31 May 1997), 74-75. See also http: }/~. lavarand, sgi. corn/.Google ScholarGoogle Scholar
  5. 5.ERDMANN, E. D. Empirical tests of binary keystreams. Master's thesis, University of London, 1992.Google ScholarGoogle Scholar
  6. 6.FAIRFIELD, R. C., ~~IORTENSON, R. L., AND KOUL- HART, K. B. An LSI random number generator (RNG). In Advances in Cryptology- CRYPTO '8~ (Santa Barbara, CA, 1984), pp. 203-230. Google ScholarGoogle Scholar
  7. 7.GANGER, G. R. System-oriented evaluation of I/O subsystem performance. PhD thesis, University of Michigan, Ann Arbor, MI, June 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.GUDE, M. Concept for a high-performance random number generator based on physical random phenomena. Frequenz 39 (1985), 187-190.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9.H.~STAD, J. Pseudo-random generators under uniform assumptions. In Proceedings of the Twenty Second Annual A CM Symposium on Theory of Computing (Baltimore, MD, 14-16 May 1990), pp. 395-404. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.H~,STAD, J., IMPAGLIAZZO, 1:{., LEVIN, L., AND LUBY, M. Pseudo-random generation based on one-way functions. To appear in SIAM Journal of Computing. A preliminary version appears in STOC, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.IMPAGLIAZZO, R., LEVIN, L. A., AND LUBY, M. Pseudo-random generation from one-way functions (extended abstract). In Proceedings of the Twenty First Annual A CM Symposium on Theory of Computing (Seattle, WA, 15-17 May 1989), pp. 12-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.KNUTH, D. The Art of Computer Programming, Seminumerical Algorithms, second ed. Addison Wesley, Reading, MA, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.LACY, J. B., MITCHELL, D. P., AND SCHELL, W. M. Cryptolib: Cryptography in software. In USENIX Security Symposium IV Proceedings (Santa Clara, CA, October 1993), USENIX Association, pp. 1-17. See also ftp://research, art. com/dist/mab/librand, slat.Google ScholarGoogle Scholar
  14. 14.LUBY, M. Pseudorandomness and Cryptographie Applications. Princeton University Press, New Jersey, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.MARSALGIA, G. Diehard. http:/Istat.fsu.edu/ ~geo/diehard.html.Google ScholarGoogle Scholar
  16. 16.MAURER, U. A universal statistical test for random bit generators. Journal of Cryptology (1992), 89-105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.MAURER, U. M. A universal statistical test for random bit generators. In Advances in Cryptology - CRYPTO '90 (Santa Barbara, CA, 1990), Springer Verlag, pp. 409-420. Published in Lecture Notes in Computer Science v. 537. Google ScholarGoogle Scholar
  18. 18.RICHTER, M. Ein Rausehgenerator zur Gewinnung yon Quasi-idealen Zufallszahlen .far die Stoehastische Simulation. PhD thesis, Aachen University of Technology, 1992. In German.Google ScholarGoogle Scholar
  19. 19.RSA DATA SECURITY, INC. RSA SecurPC for Windows 95 Users Manual, 1997.Google ScholarGoogle Scholar
  20. 20.RUEMMLER, C., AND WILKES, J. An introduction to disk drive modeling. IEEE Computer 27, 3 (March 1994), 17- 28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.SANTHA, M., AND VAZIRANI, U.V. Generating quasirandom sequences from slightly-random sources (extended abstract). In 25th Annual Symposium on Foundations of Computer Science (Singer Island, FL, 24-26 Oct. 1984), IEEE, pp. 434-440.Google ScholarGoogle Scholar
  22. 22.SCHNEIER, B. Applied Cryptography, second ed. John Wiley & Sons, Inc., 1996.Google ScholarGoogle Scholar
  23. 23.SHRIVER, E. Performance modeling for realistic storage devices. PhD thesis, New York University, New York, NY, May 1997. Available at http://~.bell-labs.com/Nshriver/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.WILKES, J. The Pantheon storage-system simulator. Tech. Rep. HPL-SSP-95-14, Storage Systems Program, Hewlett- Packard Laboratories, Palo Alto, GA, December 1995.Google ScholarGoogle Scholar
  25. 25.WORTHINGTON, B. L., GANGER, G. R., PATT, Y. N., AND VILKES, J. On-line extraction of scsi disk drive parameters. In Proceedings of A CM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (Ottawa, Canada, May 1995), ACM Press, pp. 146-56. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A practical secure physical random bit generator

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CCS '98: Proceedings of the 5th ACM conference on Computer and communications security
              November 1998
              160 pages
              ISBN:1581130074
              DOI:10.1145/288090

              Copyright © 1998 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 November 1998

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate1,261of6,999submissions,18%

              Upcoming Conference

              CCS '23
              ACM SIGSAC Conference on Computer and Communications Security
              November 26 - 30, 2023
              Copenhagen , Denmark

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!