{"id":"https://openalex.org/W2604510097","doi":"https://doi.org/10.13154/tosc.v2017.i1.506-544","title":"SoK: Security Models for Pseudo-Random Number Generators","display_name":"SoK: Security Models for Pseudo-Random Number Generators","publication_year":2017,"publication_date":"2017-03-07","ids":{"openalex":"https://openalex.org/W2604510097","doi":"https://doi.org/10.13154/tosc.v2017.i1.506-544","mag":"2604510097"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:0b1ccf3a174a4c7eacb836c3235685cf","is_oa":true,"landing_page_url":"https://doaj.org/article/0b1ccf3a174a4c7eacb836c3235685cf","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 506-544 (2017)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/0b1ccf3a174a4c7eacb836c3235685cf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042884181","display_name":"Sylvain Ruhault","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ruhault, Sylvain","raw_affiliation_strings":["Oppida, 6 avenue du Vieil Etang, 78180 Montigny Le Bretonneux"],"affiliations":[{"raw_affiliation_string":"Oppida, 6 avenue du Vieil Etang, 78180 Montigny Le Bretonneux","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5042884181"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.0012,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84720475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7675662040710449},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.6567674875259399},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6562057733535767},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5238656401634216},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.4767916202545166},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4767283499240875},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4706123471260071},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.4673998951911926},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.45735305547714233},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.42175719141960144},{"id":"https://openalex.org/keywords/randomness-tests","display_name":"Randomness tests","score":0.4206707179546356},{"id":"https://openalex.org/keywords/accumulator","display_name":"Accumulator (cryptography)","score":0.41860732436180115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3693959712982178},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27316009998321533},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2130095660686493},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1164739727973938},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10948529839515686}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7675662040710449},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.6567674875259399},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6562057733535767},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5238656401634216},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.4767916202545166},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4767283499240875},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4706123471260071},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.4673998951911926},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.45735305547714233},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.42175719141960144},{"id":"https://openalex.org/C18017163","wikidata":"https://www.wikidata.org/wiki/Q13560113","display_name":"Randomness tests","level":3,"score":0.4206707179546356},{"id":"https://openalex.org/C2078106","wikidata":"https://www.wikidata.org/wiki/Q14906620","display_name":"Accumulator (cryptography)","level":2,"score":0.41860732436180115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3693959712982178},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27316009998321533},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2130095660686493},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1164739727973938},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10948529839515686},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:doaj.org/article:0b1ccf3a174a4c7eacb836c3235685cf","is_oa":true,"landing_page_url":"https://doaj.org/article/0b1ccf3a174a4c7eacb836c3235685cf","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 506-544 (2017)","raw_type":"article"},{"id":"doi:10.13154/tosc.v2017.i1.506-544","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2017.i1.506-544","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:0b1ccf3a174a4c7eacb836c3235685cf","is_oa":true,"landing_page_url":"https://doaj.org/article/0b1ccf3a174a4c7eacb836c3235685cf","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 506-544 (2017)","raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W639928820","https://openalex.org/W1512388984","https://openalex.org/W1751997554","https://openalex.org/W2015880590","https://openalex.org/W2134101189","https://openalex.org/W2148892264","https://openalex.org/W2164284862"],"related_works":["https://openalex.org/W4382565725","https://openalex.org/W2545856367","https://openalex.org/W2147174456","https://openalex.org/W4385414867","https://openalex.org/W2529728413","https://openalex.org/W2909894316","https://openalex.org/W2731703024","https://openalex.org/W4205967719","https://openalex.org/W3133575425","https://openalex.org/W219960904"],"abstract_inverted_index":{"Randomness":[0],"plays":[1],"an":[2],"important":[3],"role":[4],"in":[5,8,13],"multiple":[6],"applications":[7],"cryptography.":[9],"It":[10],"is":[11],"required":[12],"fundamental":[14],"tasks":[15],"such":[16],"as":[17],"key":[18],"generation,":[19],"masking":[20],"and":[21,25,44,75,101,105,128,130,145,151],"hiding":[22],"values,":[23],"nonces":[24],"initialization":[26],"vectors":[27],"generation.":[28],"Pseudo-random":[29],"number":[30],"generators":[31,65,74,76,119],"have":[32,67,89],"been":[33,68],"studied":[34],"by":[35],"numerous":[36],"authors,":[37],"either":[38],"to":[39,48,94],"propose":[40,103],"clear":[41],"security":[42,85,135],"notions":[43,63,125],"associated":[45],"constructions":[46],"or":[47],"point":[49,132],"out":[50,133],"potential":[51,161],"vulnerabilities.":[52],"In":[53,115],"this":[54,156],"systematization":[55],"of":[56,64,118,126,148,163],"knowledge":[57],"paper,":[58],"we":[59,82,102,122,131,158],"present":[60,83],"the":[61,98,111,124,139,142,146,149,152,164],"three":[62],"that":[66,134],"successively":[69],"formalized:":[70],"standard":[71,166],"generators,":[72],"stateful":[73],"with":[77,120],"input.":[78],"For":[79],"each":[80],"notion,":[81],"expected":[84],"properties,":[86],"where":[87],"adversaries":[88],"increasing":[90],"capabilities":[91],"(including":[92],"access":[93],"partial":[95],"information":[96],"on":[97,110,138],"internal":[99],"variables)":[100],"secure":[104],"efficient":[106],"constructions,":[107],"all":[108],"based":[109],"block":[112],"cipher":[113],"AES.":[114],"our":[116],"description":[117],"input,":[121],"revisit":[123],"accumulator":[127,150],"extractor":[129],"crucially":[136],"relies":[137],"independence":[140],"between":[141],"randomness":[143],"source":[144],"seeds":[147],"extractor.":[153],"To":[154],"illustrate":[155],"requirement,":[157],"identify":[159],"a":[160],"vulnerability":[162],"NIST":[165],"CTR_DRBG.":[167]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
