Z. Gutterman, B. Pinkas, and T. Reinman, Analysis of the Linux random number generator, 2006 IEEE Symposium on Security and Privacy (S&P'06), p.371385, 2006.
DOI : 10.1109/SP.2006.5

L. Dorrendorf, Z. Gutterman, and B. Pinkas, Cryptanalysis of the random number generator of the Windows operating system, ACM Transactions on Information and System Security, vol.13, issue.1, p.132, 2009.
DOI : 10.1145/1609956.1609966

L. Dorrendorf, Cryptanalysis of the windows random number generator, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07
DOI : 10.1145/1315245.1315304

Z. Gutterman and D. Malkhi, Hold Your Sessions: An Attack on Java Session-Id Generation, Topics in Cryptology -CT-RSA 2005, p.4457, 2005.
DOI : 10.1007/978-3-540-30574-3_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.7188

S. Kamkar, phpwn: Attacking sessions and pseudo-random numbers in PHP, 2010.

J. Kelsey, B. Schneier, and N. Ferguson, Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
DOI : 10.1007/3-540-46513-8_2

A. Seznec and N. Sendrier, HAVEGE, ACM Transactions on Modeling and Computer Simulation, vol.13, issue.4, p.334346, 2003.
DOI : 10.1145/945511.945516

A. Francillon and C. Castelluccia, TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007.
DOI : 10.1109/WIOPT.2007.4480051

URL : https://hal.archives-ouvertes.fr/inria-00190971

C. W. Donnell, G. E. Suh, and S. Devadas, PUF-based random number generation. MIT CSAIL CSG Technical Memo 481, Massachusetts Institute of Technology, 2004.

D. Davis, R. Ihaka, and P. Fenstermacher, Cryptographic Randomness from Air Turbulence in Disk Drives, Advances in Cryptology -CRYPTO '94
DOI : 10.1007/3-540-48658-5_13

J. Kelsey, Entropy sources, In: NIST RNG Workshop, 2004.

P. Gutmann, Testing issues with OS-based entropy sources, In: NIST RNG Workshop, 2004.

B. Barak, R. Shaltiel, and E. Tromer, True Random Number Generators Secure in a Changing Environment, Cryptographic Hardware and Embedded Systems -CHES 2003. Lecture Notes in Computer Science 2779, p.166180, 2003.
DOI : 10.1007/978-3-540-45238-6_14

P. Gutmann, Software generation of practically strong random numbers, USENIX Security Symposium -SSYM'98, 1998.

E. Barker and J. Kelsey, Recommendation for random number generation using deterministic random bit generators (revised), National Institute of Standards and Technology -NIST, 2007.
DOI : 10.6028/nist.sp.800-90r

B. Barak and S. Halevi, A model and architecture for pseudo-random generation with applications to /dev/random, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, p.203212, 2005.
DOI : 10.1145/1102120.1102148

M. Bucci and R. Luzzi, Design of Testable Random Bit Generators, Cryptographic Hardware and Embedded Systems -CHES 2005
DOI : 10.1007/11545262_11

C. E. Shannon, A mathematical theory of communication, Bell System Technical Journal, vol.27, issue.5, p.379423, 1948.

A. Rényi, On measures of entropy and information, Berkeley Symposium on Mathematical Statistics and Probability, p.547561, 1961.

W. Schindler, Ecient online tests for true random number generators
DOI : 10.1007/3-540-44709-1_10

A. Antos and I. Kontoyiannis, Convergence properties of functional estimates for discrete distributions, Random Structures and Algorithms, vol.24, issue.3-4, p.163193, 2001.
DOI : 10.1002/rsa.10019

L. Paninski, Estimation of Entropy and Mutual Information, Neural Computation, vol.25, issue.6, p.11911253, 2003.
DOI : 10.1103/PhysRevE.52.6841

L. Paninski, Estimating entropy on m bins given fewer than m samples. Information Theory, IEEE Transactions on, vol.50, issue.2200, p.2203, 2004.
DOI : 10.1109/tit.2004.833360

P. Grassberger, Entropy estimates from insucient samplings. arXiv:physics, pp.307138-307140, 2008.

D. Salomon and G. Motta, Handbook of Data Compression, 2009.
DOI : 10.1007/978-1-84882-903-9

I. Kontoyiannis, P. H. Algoet, Y. M. Suhov, and A. J. Wyner, Nonparametric entropy estimation for stationary processes and random elds, with applications to English text, IEEE Transactions on Information Theory, vol.44, issue.3, p.13191327, 1998.

Y. Gao, I. Kontoyiannis, and E. Bienenstock, Estimating the Entropy of Binary Time Series: Methodology, Some Theory and a Simulation Study, Entropy, vol.10, issue.2, p.7199, 2008.
DOI : 10.3390/entropy-e10020071

A. D. Wyner and J. Ziv, Some asymptotic properties of the entropy of a stationary ergodic data source with applications to data compression. Information Theory, IEEE Transactions on, vol.35, issue.6, p.12501258, 1989.

S. Wegenkittl, Entropy estimators and serial tests for ergodic chains, IEEE Transactions on Information Theory, vol.47, issue.6
DOI : 10.1109/18.945259

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.684

T. M. Cover and J. Thomas, Elements of Information Theory. 2 edn, 2006.

F. Móricz, Strong Limit Theorems for Blockwise m-Dependent and Blockwise Quasiorthogonal Sequences of Random Variables, Proceedings of the American Mathematical Society, vol.101, issue.4, p.709715, 1987.
DOI : 10.2307/2046676

P. Harremoës and F. Topsøe, Inequalities between entropy and index of coincidence derived from information diagrams, IEEE Transactions on Information Theory, vol.47, issue.7, p.29442960, 2001.
DOI : 10.1109/18.959272