References
- D. H. Kim, S. U. Yun, and Y. P. Yi, "The security of IoT service," in Proc. KICS Int. Conf. Commun., pp. 53-59, Jeju Island, Korea, Jul. 2013.
- K. Michaelis, C. Meyer, and J. Schwenk, Randomness fail! The State of randomness in current java implementations, Springer Berlin Hedelberg, pp. 129-144, Feb. 2013.
- D. J. Bernstein, Y. A. Chang, C. M. Cheng, L. P. Chou, N. Heninger, T. Lange, and N. V. Someren, "Factoring RSA keys form certified smart cards : Coppersmith in the wild," in Int. Conf. Theory and Appl. Cryptololgy and Inf. Secur., Springer Berlin Heidelberg, pp. 341- 360, Dec. 2013.
- Audit of github SSH Keys finds many still vu lnerable to old debian bug (2015), Retrieved November, 18, 2016, from https://threatpost.com/audit-of-gitbub-ssh-keys-finds-many-still-vulnerable-to-old-debian-bug/113117/
- True random number generator for a true hacker (2015), Retrieved November, 18, 2016, from http://hackday.com/2015/06/29/true-random-generator-for-a-true-hacker
- J. Y. Park, S. M. Shin, and N. H. Kang, "Mutual authentication and key agreement scheme between lightweight devices in internet of things," in Proc. KICS Int. Conf. Commun., pp. 707-714, Jeju Island, Korea, Jul. 2013.
- B. Barak and S. Halevi, "A model and architecture for pseudo-random generator and application to d/dev/random," CCS'05, Nov. 2015.
- Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of applied cryptography, Massachusetts Inst. Technol., 1996.
- NIST SP 800-38A, Recommendation for block cipher modes of operation methods and techniques, 2011.
- S. Thomas, SSL and TLS essentials, New York, John Wiley & Sons, Inc., 2000.
- C. H. Bennett, "Quantum cryptography: Public key distribution and coin tossing," in Int. Conf. Comput. Syst. and Sign. Process. IEEE, pp. 175-179, 1984.
- FIPS PUB 140-3, Security Requirements for Cryptographic Modules, 2009.
- NIST, SP 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, 2015.
- NIST, SP 800-90B, (Second Draft) Recommendation for the Entropy Sources Used for Random Bit Generation, 2016.
- NIST, SP 800-90C, Recommendation for Random Bit Generator(RGB) Construction, 2012.
- NIST, SP 800-22, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application, 2010.
- B. Kristinsson, "Ardrand : The arduino as a hardware random-number generator," Cryptography and Secur., Inf. Theory, Dec. 2012.
- Wikipedia, Linear congruential generator, https://en.wikipedia.org/wiki/Linear_congruential_g enerator
- National Security Agency, The simon and speck families of lightweight block ciphers, Jun. 2013.
- Implementations of lightweight block ciphers on a WSN430 sensor, http://bloc,project.citi-lab.fr/library_option_02.html
- C. Hennebert, H. Hossayni, and C. Lauraoux, "Entropy harvesting from physical sensors," Wisec'13, pp. 149-154, Budapest, Hungary, Apr. 2013.
- H. Kang, Y. Yeom, and J. S. Kang, "An implementation of integrated tool for statistical randomness tests and entropy estimations," in Proc. KICS Winter Conf., pp. 229-230, Jeongseon, Korea, Jan. 2013.
- Diharder, Retrieved November, 18, 2016, from http://www.phy.duke.edu/-rgb/General/deiharder.php