{"id":"https://openalex.org/W3120960183","doi":"https://doi.org/10.1007/978-3-030-10591-4_10","title":"Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators","display_name":"Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3120960183","doi":"https://doi.org/10.1007/978-3-030-10591-4_10","mag":"3120960183"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-10591-4_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-10591-4_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_10.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security of Ubiquitous Computing Systems","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_10.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066898395","display_name":"Darren Hurley-Smith","orcid":"https://orcid.org/0000-0002-9896-9308"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Darren Hurley-Smith","raw_affiliation_strings":["University of Kent, Canterbury, UK"],"affiliations":[{"raw_affiliation_string":"University of Kent, Canterbury, UK","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059422128","display_name":"Julio Hern\u00e1ndez-Castro","orcid":"https://orcid.org/0000-0002-6432-5328"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Julio Hernandez-Castro","raw_affiliation_strings":["University of Kent, Canterbury, UK"],"affiliations":[{"raw_affiliation_string":"University of Kent, Canterbury, UK","institution_ids":["https://openalex.org/I20581793"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066898395"],"corresponding_institution_ids":["https://openalex.org/I20581793"],"apc_list":null,"apc_paid":null,"fwci":0.3465,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.45322007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"165","last_page":"181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9416999816894531,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9057000279426575,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.7599100470542908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7198806405067444},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.6369665861129761},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5922322869300842},{"id":"https://openalex.org/keywords/predictability","display_name":"Predictability","score":0.5680068135261536},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.49574145674705505},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4861171245574951},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.46093693375587463},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.4443427324295044},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3477194309234619},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22507229447364807},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15826159715652466},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10535907745361328}],"concepts":[{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.7599100470542908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7198806405067444},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.6369665861129761},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5922322869300842},{"id":"https://openalex.org/C197640229","wikidata":"https://www.wikidata.org/wiki/Q2534066","display_name":"Predictability","level":2,"score":0.5680068135261536},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.49574145674705505},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4861171245574951},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.46093693375587463},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.4443427324295044},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3477194309234619},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22507229447364807},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15826159715652466},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10535907745361328},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-10591-4_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-10591-4_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_10.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security of Ubiquitous Computing Systems","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-030-10591-4_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-10591-4_10","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-10591-4_10.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security of Ubiquitous Computing Systems","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G87932940","display_name":null,"funder_award_id":"EP/T001011/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3120960183.pdf","grobid_xml":"https://content.openalex.org/works/W3120960183.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W25360022","https://openalex.org/W1505561248","https://openalex.org/W1517403092","https://openalex.org/W1712912884","https://openalex.org/W1963898916","https://openalex.org/W2147733013","https://openalex.org/W2170573480","https://openalex.org/W2252778103","https://openalex.org/W2523012706","https://openalex.org/W2551366213","https://openalex.org/W2729338963","https://openalex.org/W2738497373","https://openalex.org/W2769013889","https://openalex.org/W2771230908","https://openalex.org/W4237493006","https://openalex.org/W4247234599"],"related_works":["https://openalex.org/W2104480405","https://openalex.org/W2772380824","https://openalex.org/W2062045810","https://openalex.org/W1534576401","https://openalex.org/W2988803943","https://openalex.org/W2068428530","https://openalex.org/W3124991594","https://openalex.org/W2775374936","https://openalex.org/W3103095306","https://openalex.org/W2340314605"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"chapter":[2],"focuses":[3],"on":[4,50,104],"the":[5,105],"testing":[6,15],"and":[7,38,92],"certification":[8],"of":[9,36,42,45,94,108],"Random":[10],"Number":[11],"Generators":[12],"(RNG).":[13],"Statistical":[14],"is":[16],"required":[17],"to":[18,53,61],"identify":[19],"whether":[20,55],"sequences":[21],"produced":[22],"by":[23],"RNG":[24,58],"demonstrate":[25],"non-random":[26],"characteristics.":[27],"These":[28],"can":[29],"include":[30],"structures":[31],"within":[32],"their":[33],"output,":[34],"repetition":[35],"sequences,":[37],"any":[39],"other":[40,112],"form":[41],"predictability.":[43],"Certification":[44],"computer":[46],"security":[47,65],"systems":[48],"draws":[49],"such":[51],"evaluations":[52],"determine":[54],"a":[56,62],"given":[57],"implementation":[59],"contributes":[60],"secure,":[63],"robust":[64],"system.":[66],"Recently,":[67],"small-scale":[68],"hardware":[69],"RNGs":[70,96],"have":[71],"been":[72],"targeted":[73],"at":[74],"IoT":[75],"devices,":[76],"especially":[77],"those":[78],"requiring":[79],"security.":[80],"This,":[81],"however,":[82],"introduces":[83],"new":[84],"technical":[85],"challenges;":[86],"low":[87],"computational":[88],"resources":[89],"for":[90],"post-processing":[91],"evaluation":[93],"on-board":[95],"being":[97],"just":[98],"two":[99],"examples.":[100],"Can":[101],"we":[102],"rely":[103],"current":[106],"suite":[107],"statistical":[109],"tests?":[110],"What":[111],"challenges":[113],"are":[114],"encountered":[115],"when":[116],"evaluating":[117],"RNG?":[118]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
