[1] C. E. Shannon. Communication theory of secrecy systems. Bell Syst. Tech. J., 28, 656-715(1949).
[2] N. Metropolis, S. Ulam. The Monte Carlo method. J. Am. Stat. Assoc., 44, 335-341(1949).
[3] W. Schindler, W. Killmann. Evaluation criteria for true (physical) random number generators used in cryptographic applications. Cryptographic Hardware and Embedded Systems (CHES), 431-449(2002).
[25] S. Pironio. Random numbers certified by Bell’s theorem. Nature, 464, 1021-1024(2010).
[26] R. Colbeck, R. Renner. Free randomness can be amplified. Nat. Phys., 8, 450-453(2012).
[49] B. Barak, R. Shaltiel, E. Tromer. True random number generators secure in a changing environment. Cryptographic Hardware and Embedded Systems (CHES), 166-180(2003).
[52] B. Barak, Y. Dodis, H. Krawczyk. Leftover hash lemma, revisited. Advances in Cryptology-CRYPTO, 1-20(2011).