참고문헌
- A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, Chapter 3. CRC Press, 1996, pp. 87-131.
- H. Corrigan-Gibbs and S. Jana, Recommendations for randomness in the operating system: How to keep evil children out of your pool and other random facts, in Proc. USENIX HotOS (Switzerland), May 2015, pp. 1-5.
- G. Marsaglia, The diehard test suite, 2003. Available at http://www.csis.hku.hk/˜dieha rd/
- W. Killmann and W. Schindler, A proposal for: Functionality classes for random number generators, AIS 20/31. http://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_Functional ity_classes_for_random_number_generators_e.pdf;jsessionid=A837238C46E2F9205B0C2AF043153011.2_id294?__blob=publicationFile
- M. S. Turan et al., Recommendation for the entropy sources used for random bit generation, (Second DRAFT) NIST Special Publication 800-90B, Jan. 2016. http://csrc.nist.gov/publications/drafts/800-90/sp800-90b_second_draft.pdf
- P. Grassberger, Entropy estimates from insufficient samplings, arXiv: physics/0307138, 2003.
- D. H. Wolpert and D. R. Wolf, Estimating functions of probability distributions from a finite set of samples, part 1: Bayes estimators and the Shannon entropy, arXiv preprint comp-gas/9403001, 1994.
- P. Hagerty and T. Draper, Entropy bounds and statistical tests, http://csrc.nist.gov/groups/ST/rbg_workshop_2012/hagerty_entropy_paper.pdf
- J. Kelsey, K. A. McKay, and M. S. Turan, Predictive models for min-entropy estimation. In Cryptographic Hardware and Embedded Systems, in Proc. Int. Workshop, Saint-Malo (Saint-Malo, France), Sept. 13-16, 2015, pp. 373-392.
- National Institute of Standard and Technology, A statistical test suite for random and pseudorandom number generators for cryptographic applications, Special Publication 800-22,15, 2001.
- NIST, Recommendation for the Entropy Sources Used for Random Bit Generation, NIST DRAFT Special Publication 800-90B, Aug. 2012.
- H. Park et al., Key derivation functions using the dual key agreement based on QKD and RSA crypto-system, J. KICS 41 (2016), no. 4, 479-488. https://doi.org/10.7840/kics.2016.41.4.479
- K. J. Ha, C. H. Seo, and D. Y. Kim, Design of validation system for a crypto-algorithm implementation, J. KICS 39B (2014), no. 4, 242-250. https://doi.org/10.7840/kics.2014.39B.4.242
- NIST, Recommendation for the Entropy Sources Used for Random Bit Generation, (Second DRAFT) NIST Special Publication 800-90B, Jan. 2016.
- T. Kang et al., Evaluation of a betavoltaic energy converter supporting scalable modular structure, ETRI J. 41 (2019), 254-261. https://doi.org/10.4218/etrij.2018-0022
- S. Park et al., A Sing-Chip Video/Audio CODEC for Low Bit Rate Application, ETRI J. 22 (2000), 20-29.
피인용 문헌
- Counter-Interception and Counter-Exploitation Features of Noise Radar Technology vol.13, pp.22, 2021, https://doi.org/10.3390/rs13224509