1. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography by cellular automata or how fast can complexity emerge in nature? In: Yao, A.C. (ed.) Proceedings of the Innovations in Computer Science - ICS 2010, Tsinghua University, Beijing, 5–7 January 2010, pp. 1–19. Tsinghua University Press (2010)
2. Bassham III, L.E., et al.: Sp 800-22 rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (2010)
3. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Radiogatún, a belt-and-mill hash function. IACR Cryptol. ePrint Archiv. 2006, 369 (2006)
4. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak Reference (2011). http://keccak.noekeon.org/
5. Braeken, A., Borissov, Y., Nikova, S., Preneel, B.: Classification of boolean functions of 6 variables or less with respect to some cryptographic properties. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 324–334. Springer, Heidelberg (2005). https://doi.org/10.1007/11523468_27