1 |
FIPS PUB 140-1: Security Requirements for Cryptographic Modules, 1994.
|
2 |
FIPS PUB 140-2: Security Requirements for Cryptographic Modules, 2001.
|
3 |
W. Schindler and W. Killmann, "Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications," CHES 2002, LNCS, vol. 2523, 2003, pp. 431-449.
|
4 |
Y.-S. Kim and I. Vasyltsov, "New Methods for Efficient Online Test of TRNG," Samsung Journal of Innovative Technology, Communication & Network Technology, vol. 4, no. 1, Feb. 2008, pp. 117-131.
|
5 |
P. Lacharme, "Post-processing Functions for a Biased Physical Random Number Generator," FSE 2008, LNCS 5086, 2008, pp. 334-342.
|
6 |
J. von Neumann, "Various Techniques for Use in Connection with Random Digits," Von Neumann's Collected Works, London: Pergamon, 1963, pp. 768-770.
|
7 |
O. Farooq and S. Datta, "Signal-Dependent Chaotic-State-Modulated Digital Secure Communication," ETRI J., vol. 28, no. 2, Apr. 2006, pp. 250-252.
DOI
ScienceOn
|
8 |
Y.S. Kim et al., "New Constructions of p-ary Bent Sequences," IEICE Trans. Fundamentals, vol. E87-A no. 2, Feb. 2004, pp. 489-494.
|
9 |
M. Bucci and R. Luzzi, "Design of Testable Random Bit Generators," CHES 2005, LNCS, vol. 3659, 2005, pp. 147-156.
|
10 |
J.-S. Coron, "On the Security of Random Source," PKC'99, LNCS, vol. 1560, 1999, pp. 29-42.
|
11 |
T.M. Cover and J.A. Thomas, Elements of Information Theory, 2nd ed., Hoboken, New Jersey: John Wiley and Sons, 2006.
|
12 |
Y. Peres, "Iterating von Neumann's Procedure for Extracting Random Bits," Annals of Statistics, vol. 20, no. 1, 1992, pp. 590-597.
DOI
ScienceOn
|
13 |
A. Juels et al., "How to Turn Loaded Dice into Fair Coins," IEEE Trans. Inf. Theory, vol. 46, no. 3, 2000, pp. 911-921.
DOI
ScienceOn
|
14 |
S. Markovski, D. Gligoroski, and L. Kocarev, "Unbiased Random Sequences from Quasigroup String Transformations," FSE 2005, LNCS, vol. 3557, 2005, pp. 163-180.
|
15 |
M. Dichtl, "Bad and Good Ways of Post-processing Biased Physical Random Numbers," FSE 2007, LNCS 4593, 2007, pp. 137-152.
|
16 |
F.J. Mac Williams and N.J.A Sloane, The Theory of Error Correcting Codes, Amsterdam: North-Holland Pub., 1977.
|
17 |
T.K. Truong, Y. Chang, and C.D. Lee, "The Weight Distributions of Some Binary Quadratic Residue Codes," IEEE Trans. Inf. Theory, vol. 51, no. 5, May 2005, pp. 1776-1782.
DOI
ScienceOn
|
18 |
I. Vasyltsov et al., "Fast Digital TRNG Based on Metastable Ring Oscillator," CHES 2008, LNCS, vol. 5154, 2008, pp. 164-180.
|
19 |
B. Sunar, W. Martin, and D. Stinson, "A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks," IEEE Trans. Computers, vol. 56, no. 1, 2007, pp. 109-119.
DOI
|
20 |
M. Dichtl and J. Golic, "High-Speed True Random Number Generation with Logic Gates Only," CHES 2007, LNCS, vol. 4727, 2007, pp. 45-62.
|
21 |
E. Trichina et al., "Supplemental Cryptographic Hardware for Smart Cards," IEEE Micro., vol. 21, no. 6, 2001, pp. 26-35.
DOI
ScienceOn
|
22 |
W. Kim et al., "A Platform-Based SoC Design of a 32-Bit Smart Card," ETRI J., vol. 25, no. 6, Dec. 2003, pp. 510-516.
과학기술학회마을
DOI
ScienceOn
|
23 |
J.-S. No and P.V. Kumar, "A New Family of Binary Pseudorandom Sequences Having Optimal Periodic Correlation Properties and Large Linear Span," IEEE Trans. Inf. Theory, vol. IT-35, no. 2, Mar. 1989, pp. 371-379.
|
24 |
J.D. Golic, "New Methods for Digital Generation and Postprocessing of Random Data," IEEE Trans. Computers, vol. 55, no. 10, 2006, pp. 1217-1229.
DOI
|
25 |
W. Killmann and W. Schindler, "A Proposal for Functionality Classes and Evaluation Methodology for True (Physical) Random Number Generators," AIS.31 Standard, 2001, URL: http://www. bsi.bund.de/ zertifiz/zert/interpr/trngk31e.pdf
|