Extractors and Lower Bounds for Locally Samplable Sources, TOCT, vol.17, issue.1, p.3, 2012. ,
DOI : 10.1007/s00145-003-0237-x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.9098
A New Pseudorandom Generator from Collision-Resistant Hash Functions, CT-RSA, vol.12, issue.4, pp.187-202 ,
DOI : 10.1007/BF01305237
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.5405
A model and architecture for pseudorandom generation with applications to, ACM Conference on Computer and Communications Security 2005, pp.203-212 ,
Eran Tromer: True Random Number Generators Secure in a Changing Environment, CHES, vol.2003, pp.166-180 ,
How to generate cryptographically strong sequences of pseudo random bits, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.112-117 ,
DOI : 10.1109/SFCS.1982.72
Cryptanalysis of the windows random number generator, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.476-485, 2007. ,
DOI : 10.1145/1315245.1315304
Foundation of Cryptography (I), 2001. ,
Foundation of Cryptography (II), 2004. ,
Monotone Circuits: One-Way Functions versus pseudorandom Generators, Electronic Colloquium on Computational Complexity (ECCC), vol.18, p.121, 2011. ,
Randomness and the Netscape Browser. Dr. Dobb's Journal, pp.66-70, 1996. ,
Deterministic extractors for small-space sources, Journal of Computer and System Sciences, vol.77, issue.1, pp.191-220, 2011. ,
DOI : 10.1016/j.jcss.2010.06.014
Theory and Applications of Trapdoor Functions (Extended Abstract, FOCS, vol.1982, pp.80-91 ,
Colin Jia Zheng: Characterizing pseudoentropy and simplifying pseudorandom generator constructions, STOC, vol.2012, pp.817-836 ,