참고문헌
- NIST, Recommendation for the Entropy Sources Used for Random Bit Generation, NIST DRAFT Special Publication 800-90B, Aug. 2012.
- NIST, Recommendation for Random Bit Generator(RBG) Constructions, NIST Special Publication 800-90C, Aug. 2012.
- H. Kang, Y. Yeom, and J. S. Kang, "An implementation of integrated tool for statistical randomness tests and entropy estimations," in Proc. KICS Winter Conf. 2016, pp. 229-230, Jeongseon, Korea, Jan. 2016.
- NIST, Recommendation for the Entropy Sources Used for Random Bit Generation, (Second DRAFT)NIST Special Publication 800-90B, Jan. 2016.
- C. E. Shannon, "Prediction and entropy of printed English," Bell Syst. Tech. J., vol. 30, no. 1, pp. 50-64, 1951. https://doi.org/10.1002/j.1538-7305.1951.tb01366.x
- K. Horvath, H. Stogner, A. Uhl, and G. Weinhandel, "Lossless compression of polar iris image data," Pattern Recognition and Image Anal., vol. 6669, pp. 329-337, 2011. https://doi.org/10.1007/978-3-642-21257-4_41
- N. Chater and C. D. Manning, "Probabilistic models of language processing and acquisition," Trends in Cognitive Sci., vol. 10, no. 7, pp. 335-344, 2006. https://doi.org/10.1016/j.tics.2006.05.006
- R. Collobert, J. Weston, L, Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa, "Natural language processing (almost) from scratch," J. Machine Learning Res., pp. 2493-2537, 2011.
- J. Kelsey, K. A. McKay, and M. S. Turan, "Predictive models for min-entropy estimation," CHES 2015, vol. 9293, pp. 373-392, Sept. 2015.
- Y. Kim and K. Yi, "Safety comparision analysis against known/chosen plaintext attack of RBF (Random Block Feedback) mode to other block cipher modes of operation," J. KICS, vol. 39B no. 05, pp. 317-322, 2014. https://doi.org/10.7840/kics.2014.39B.5.317
- H. Park, M. Bae, J. S. Kang, and Y. Yeom, "Key derivation functions using the dual key agreement based on QKD and RSA cryptosystem," J. KICS, vol. 41 no. 04, pp. 479-488, 2016. https://doi.org/10.7840/kics.2016.41.4.479
- K. J. Ha, C. H. Seo, and D. Y. Kim, "Design of validation system for a crypto-algorithm implementation," J. KICS, vol. 39B no. 04, pp. 242-250, 2014. https://doi.org/10.7840/kics.2014.39B.4.242
- H. Park, M. Bae, Y. Yeom, and J. S. Kang, "A study on the predictor of Non-IID track in SP 800-90B," in Proc. KICS Int. Conf. Commun., pp. 115-116, Jeju, Korea, Jun. 2016.
- D. Salomon, Data Compression: The Complete Reference Fourth Edition, Springer, pp. 189-192, 2007.
- W. Feller, An Introduction to Probability Theory and Its Applications Third Edition, John Wiley & Sons, Inc, pp. 303-341, 1950.
- ID Quantique SA, Retrieved Aug., 28 from http://www.idquantique.com/random-number-generation/quantis-random-number-generator/.
- NIST, SP800-90B_EntropyAssessment, Retrieved Aug., 28 from https://github.com/usnistgov/SP800-90B_EntropyAssessment.