A. De and T. Watson, Extractors and Lower Bounds for Locally Samplable Sources, TOCT, vol.17, issue.1, p.3, 2012.
DOI : 10.1007/s00145-003-0237-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.9098

A. Boldyreva and V. Kumar, A New Pseudorandom Generator from Collision-Resistant Hash Functions, CT-RSA, vol.12, issue.4, pp.187-202
DOI : 10.1007/BF01305237

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.5405

B. Barak and S. Halevi, A model and architecture for pseudorandom generation with applications to, ACM Conference on Computer and Communications Security 2005, pp.203-212

B. Barak and R. Shaltiel, Eran Tromer: True Random Number Generators Secure in a Changing Environment, CHES, vol.2003, pp.166-180

M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudo random bits, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.112-117
DOI : 10.1109/SFCS.1982.72

L. Dorrendorf, Z. Gutterman, and B. Pinkas, Cryptanalysis of the windows random number generator, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.476-485, 2007.
DOI : 10.1145/1315245.1315304

O. Goldreich, Foundation of Cryptography (I), 2001.

O. Goldreich, Foundation of Cryptography (II), 2004.

O. Goldreich and R. Izsak, Monotone Circuits: One-Way Functions versus pseudorandom Generators, Electronic Colloquium on Computational Complexity (ECCC), vol.18, p.121, 2011.

I. Goldberg and D. Wagner, Randomness and the Netscape Browser. Dr. Dobb's Journal, pp.66-70, 1996.

J. Kamp, A. Rao, S. P. Vadhan, and D. Zuckerman, Deterministic extractors for small-space sources, Journal of Computer and System Sciences, vol.77, issue.1, pp.191-220, 2011.
DOI : 10.1016/j.jcss.2010.06.014

A. Yao, Theory and Applications of Trapdoor Functions (Extended Abstract, FOCS, vol.1982, pp.80-91

P. Salil and . Vadhan, Colin Jia Zheng: Characterizing pseudoentropy and simplifying pseudorandom generator constructions, STOC, vol.2012, pp.817-836