
- 1.AGNEW, G. B. Random sources for cryptographic systems. In Advances in Cryptology - Burocrypt '87, D. Chaum and W. L. Price, Eds., Springer Verlag, pp. 77-81. Published in Lecture Notes in Computer Science v. 304, 1988.Google Scholar
- 2.AT&T. T7001 random number generator. Data Sheet.Google Scholar
- 3.DAVIS, D., IHAKA, a., AND FENSTERMACHER, P. Cryptographic randomness from air turbulence in disk drives. In Advances in gryptology- CRYPTO '9~ (Santa Barbara, CA), Springer Verlag, pp. 114-120. Published in Lecture Notes in Computer Science v. 839. Google Scholar
- 4.Computing random numbers. Light headed. The Economist (31 May 1997), 74-75. See also http: }/~. lavarand, sgi. corn/.Google Scholar
- 5.ERDMANN, E. D. Empirical tests of binary keystreams. Master's thesis, University of London, 1992.Google Scholar
- 6.FAIRFIELD, R. C., ~~IORTENSON, R. L., AND KOUL- HART, K. B. An LSI random number generator (RNG). In Advances in Cryptology- CRYPTO '8~ (Santa Barbara, CA, 1984), pp. 203-230. Google Scholar
- 7.GANGER, G. R. System-oriented evaluation of I/O subsystem performance. PhD thesis, University of Michigan, Ann Arbor, MI, June 1995. Google Scholar
Digital Library
- 8.GUDE, M. Concept for a high-performance random number generator based on physical random phenomena. Frequenz 39 (1985), 187-190.Google Scholar
Cross Ref
- 9.H.~STAD, J. Pseudo-random generators under uniform assumptions. In Proceedings of the Twenty Second Annual A CM Symposium on Theory of Computing (Baltimore, MD, 14-16 May 1990), pp. 395-404. Google Scholar
Digital Library
- 10.H~,STAD, J., IMPAGLIAZZO, 1:{., LEVIN, L., AND LUBY, M. Pseudo-random generation based on one-way functions. To appear in SIAM Journal of Computing. A preliminary version appears in STOC, 1989. Google Scholar
Digital Library
- 11.IMPAGLIAZZO, R., LEVIN, L. A., AND LUBY, M. Pseudo-random generation from one-way functions (extended abstract). In Proceedings of the Twenty First Annual A CM Symposium on Theory of Computing (Seattle, WA, 15-17 May 1989), pp. 12-24. Google Scholar
Digital Library
- 12.KNUTH, D. The Art of Computer Programming, Seminumerical Algorithms, second ed. Addison Wesley, Reading, MA, 1981. Google Scholar
Digital Library
- 13.LACY, J. B., MITCHELL, D. P., AND SCHELL, W. M. Cryptolib: Cryptography in software. In USENIX Security Symposium IV Proceedings (Santa Clara, CA, October 1993), USENIX Association, pp. 1-17. See also ftp://research, art. com/dist/mab/librand, slat.Google Scholar
- 14.LUBY, M. Pseudorandomness and Cryptographie Applications. Princeton University Press, New Jersey, 1996. Google Scholar
Digital Library
- 15.MARSALGIA, G. Diehard. http:/Istat.fsu.edu/ ~geo/diehard.html.Google Scholar
- 16.MAURER, U. A universal statistical test for random bit generators. Journal of Cryptology (1992), 89-105. Google Scholar
Digital Library
- 17.MAURER, U. M. A universal statistical test for random bit generators. In Advances in Cryptology - CRYPTO '90 (Santa Barbara, CA, 1990), Springer Verlag, pp. 409-420. Published in Lecture Notes in Computer Science v. 537. Google Scholar
- 18.RICHTER, M. Ein Rausehgenerator zur Gewinnung yon Quasi-idealen Zufallszahlen .far die Stoehastische Simulation. PhD thesis, Aachen University of Technology, 1992. In German.Google Scholar
- 19.RSA DATA SECURITY, INC. RSA SecurPC for Windows 95 Users Manual, 1997.Google Scholar
- 20.RUEMMLER, C., AND WILKES, J. An introduction to disk drive modeling. IEEE Computer 27, 3 (March 1994), 17- 28. Google Scholar
Digital Library
- 21.SANTHA, M., AND VAZIRANI, U.V. Generating quasirandom sequences from slightly-random sources (extended abstract). In 25th Annual Symposium on Foundations of Computer Science (Singer Island, FL, 24-26 Oct. 1984), IEEE, pp. 434-440.Google Scholar
- 22.SCHNEIER, B. Applied Cryptography, second ed. John Wiley & Sons, Inc., 1996.Google Scholar
- 23.SHRIVER, E. Performance modeling for realistic storage devices. PhD thesis, New York University, New York, NY, May 1997. Available at http://~.bell-labs.com/Nshriver/. Google Scholar
Digital Library
- 24.WILKES, J. The Pantheon storage-system simulator. Tech. Rep. HPL-SSP-95-14, Storage Systems Program, Hewlett- Packard Laboratories, Palo Alto, GA, December 1995.Google Scholar
- 25.WORTHINGTON, B. L., GANGER, G. R., PATT, Y. N., AND VILKES, J. On-line extraction of scsi disk drive parameters. In Proceedings of A CM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (Ottawa, Canada, May 1995), ACM Press, pp. 146-56. Google Scholar
Digital Library
Index Terms
A practical secure physical random bit generator
Recommendations
Bit-Wise Behavior of Random Number Generators
In 1985, G. Marsaglia proposed the m-tuple test, a runs test on bits, as a test of nonrandomness of a sequence of pseudorandom integers. We try this test on the outputs from a large set of pseudorandom number generators and discuss the behavior of the ...
Pseudo Random Bit Generator using Logistic and Bernoulli Maps
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesWe propose pseudo random bit generator(PRBG) by constructing an ergodic orbit of logistic map generated using intermittent perturbation and sampling the orbit using Bernoulli shift map. The pseudo randomness of the key streams is tested with the ...
Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs
TrustED '16: Proceedings of the 6th International Workshop on Trustworthy Embedded DevicesIn the age of the IoT (Internet of Things), a random number generator plays an important role of generating encryption keys and authenticating a piece of an embedded equipment. The random numbers are required to be uniformly distributed statistically ...






Comments