Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Sidorenko A., Design and analysis of provably secure pseudorandom generators, Ph. D. Thesis, Eindhoven, 2007
[2] Barker E., Kelsey J., Recommendation for random number generation using deterministic random bit generators, NIST Special Publication (SP) 800-90, December 2005
[3] Blum M., Micali S., “How to generate cryptographically strong sequences of pseudo random bits”, Symp. Found. Comput. Sci., 1982, 112–117 | MR
[4] Brown D., Conjectured security of the ANSI-NIST elliptic curve RNG, Cryptology ePrint Archive, Report 2006/117, , 2006 http://eprint.iacr.org/
[5] Gutterman Z., Pinkas B., Reinman T., “Analysis of the Linux random number generator”, IEEE Symp. Security and Privacy, Oakland, CA, USA, May 2006
[6] Farashahi R. R., Pellikaan R., Sidorenko A., “Extractors for binary elliptic curves”, Designs, Codes, and Cryptography, 49:1–3 (2008), 171–186 | DOI | MR | Zbl
[7] Goldwasser S., Micali S., Tong P., “Why and how to establish a private code on a public network”, Symp. Found. Comput. Sci., 1982, 134–144 | MR
[8] Htad J., Impagliazzo R., Levin L. A., Luby M., “Construction of a pseudo-random generator from any one-way function”, SIAM J. Comput., 28 (1999), 1364–1396 | DOI | MR
[9] Kaliski B. S., Elliptic curves and cryptography: A pseudorandom bit generator and other tools, Ph. D. thesis, MIT, Cambridge, MA, USA, 1988
[10] Long D. L., Wigderson A., “How discreet is the discrete log”, ACM Symp. Theory of Computing, 1983, 413–420