. Atmel, Atmega128(l) datasheet, doc2467: 8-bit microcontroller with 128k bytes in-system programmable flash

B. Barak and S. Halevi, A model and architecture for pseudo-random generation with applications to /dev/random, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005.
DOI : 10.1145/1102120.1102148

Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin, Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, LNCS, vol.3152, 2004.
DOI : 10.1007/978-3-540-28628-8_30

P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, Securing the deluge Network programming system, Proceedings of the fifth international conference on Information processing in sensor networks , IPSN '06, pp.326-333, 2006.
DOI : 10.1145/1127777.1127826

N. Ferguson and B. Schneier, Practical Cryptography, 2003.

P. Gutmann, Software generation of practically strong random numbers, 7th USENIX Security Symposium

C. Karlof, N. Sastry, and D. Wagner, TinySec, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, 2004.
DOI : 10.1145/1031495.1031515

J. Kelsey, B. Schneier, and N. Ferguson, Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator [11] P. Mutaf. True random numbers from Wi-Fi background noise, Selected Areas in Cryptography, number Generators, pp.13-33, 1999.

T. Park and K. G. Shin, Soft tamper-proofing via program integrity verification in wireless sensor networks, IEEE Transactions on Mobile Computing, 2005.

D. Seetharam and S. Rhee, An effcient random number generator for low-power sensor networks

A. Seznec and N. Sendrier, HAVEGE, ACM Transactions on Modeling and Computer Simulation, vol.13, issue.4, pp.334-346, 2003.
DOI : 10.1145/945511.945516