{"issue":"3","language":[{"iso":"eng"}],"year":"2018","volume":2018,"publication_identifier":{"eissn":["2569-2925"]},"date_created":"2021-11-14T23:01:25Z","date_updated":"2021-11-15T10:48:49Z","file":[{"content_type":"application/pdf","checksum":"b816b848f046c48a8357700d9305dce5","file_id":"10289","success":1,"date_created":"2021-11-15T10:27:29Z","date_updated":"2021-11-15T10:27:29Z","access_level":"open_access","creator":"cchlebak","file_size":955755,"file_name":"2018_IACR_Allini.pdf","relation":"main_file"}],"month":"01","publication_status":"published","oa_version":"Published Version","scopus_import":"1","_id":"10286","status":"public","department":[{"_id":"KrPi"}],"publication":"IACR Transactions on Cryptographic Hardware and Embedded Systems","author":[{"full_name":"Allini, Elie Noumon","last_name":"Allini","first_name":"Elie Noumon"},{"full_name":"Skórski, Maciej","last_name":"Skórski","first_name":"Maciej","id":"EC09FA6A-02D0-11E9-8223-86B7C91467DD"},{"first_name":"Oto","last_name":"Petura","full_name":"Petura, Oto"},{"last_name":"Bernard","full_name":"Bernard, Florent","first_name":"Florent"},{"full_name":"Laban, Marek","last_name":"Laban","first_name":"Marek"},{"last_name":"Fischer","full_name":"Fischer, Viktor","first_name":"Viktor"}],"page":"214-242","ddc":["000"],"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"title":"Evaluation and monitoring of free running oscillators serving as source of randomness","oa":1,"intvolume":" 2018","citation":{"mla":"Allini, Elie Noumon, et al. “Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 3, International Association for Cryptologic Research, 2018, pp. 214–42, doi:10.13154/tches.v2018.i3.214-242.","ista":"Allini EN, Skórski M, Petura O, Bernard F, Laban M, Fischer V. 2018. Evaluation and monitoring of free running oscillators serving as source of randomness. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018(3), 214–242.","short":"E.N. Allini, M. Skórski, O. Petura, F. Bernard, M. Laban, V. Fischer, IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 (2018) 214–242.","chicago":"Allini, Elie Noumon, Maciej Skórski, Oto Petura, Florent Bernard, Marek Laban, and Viktor Fischer. “Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.” IACR Transactions on Cryptographic Hardware and Embedded Systems. International Association for Cryptologic Research, 2018. https://doi.org/10.13154/tches.v2018.i3.214-242.","ieee":"E. N. Allini, M. Skórski, O. Petura, F. Bernard, M. Laban, and V. Fischer, “Evaluation and monitoring of free running oscillators serving as source of randomness,” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 3. International Association for Cryptologic Research, pp. 214–242, 2018.","ama":"Allini EN, Skórski M, Petura O, Bernard F, Laban M, Fischer V. Evaluation and monitoring of free running oscillators serving as source of randomness. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018;2018(3):214-242. doi:10.13154/tches.v2018.i3.214-242","apa":"Allini, E. N., Skórski, M., Petura, O., Bernard, F., Laban, M., & Fischer, V. (2018). Evaluation and monitoring of free running oscillators serving as source of randomness. IACR Transactions on Cryptographic Hardware and Embedded Systems. International Association for Cryptologic Research. https://doi.org/10.13154/tches.v2018.i3.214-242"},"doi":"10.13154/tches.v2018.i3.214-242","article_processing_charge":"No","date_published":"2018-01-01T00:00:00Z","quality_controlled":"1","article_type":"original","has_accepted_license":"1","abstract":[{"text":"In this paper, we evaluate clock signals generated in ring oscillators and self-timed rings and the way their jitter can be transformed into random numbers. We show that counting the periods of the jittery clock signal produces random numbers of significantly better quality than the methods in which the jittery signal is simply sampled (the case in almost all current methods). Moreover, we use the counter values to characterize and continuously monitor the source of randomness. However, instead of using the widely used statistical variance, we propose to use Allan variance to do so. There are two main advantages: Allan variance is insensitive to low frequency noises such as flicker noise that are known to be autocorrelated and significantly less circuitry is required for its computation than that used to compute commonly used variance. We also show that it is essential to use a differential principle of randomness extraction from the jitter based on the use of two identical oscillators to avoid autocorrelations originating from external and internal global jitter sources and that this fact is valid for both kinds of rings. Last but not least, we propose a method of statistical testing based on high order Markov model to show the reduced dependencies when the proposed randomness extraction is applied.","lang":"eng"}],"file_date_updated":"2021-11-15T10:27:29Z","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","type":"journal_article","publisher":"International Association for Cryptologic Research","day":"01"}