1. M. Sýs, P. Švenda, M. Ukrop, V. Matyas, Constructing empirical tests of randomness. Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT), pp 1-9, IEEE (2014).
2. National Institute of Standards and Technology, FIPS 140-2:Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publications (2001).
3. ISO/IEC 15408-1:2009, Informational technology - Security techniques-Evaluation criteria for IT security, Part 1: Introduction and general model, (2009). https://www.iso.org/standard/50341.html
4. L. E. Bassham, A. L. Rukhin, J. Soto, J. R. Nechvatal, M. E. Smid, E. B. Barker, S. D. Leigh, M. Levenson, M. Vangel, D. L. Banks, N. A. Heckert, J. F. Dray, S. Vo, SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, National Institute of Standards and Technology, Gaithersburg, MD, USA, Tech. Rep. (2010).
5. R. G. Brown, Dieharder: A random number test suite, version 3.31.1, Duke University Physics Department (2014). http://www.phy.duke.edu/~rgb/General/dieharder.php.