1. Ball, J., Borger, J., Greenwald, G.: Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, September 2013.
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
2. Barker, E., Kelsey, J.: Recommendation for random number generation using deterministic random bit generators, January 2012.
http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
3. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS, Miami Beach, Florida, 19–22 October, pp. 394–403. IEEE Computer Society Press (1997)
4. Lecture Notes in Computer Science;M Bellare,2014
5. Checkoway, S., Niederhagen, R., Everspaugh, A., Green, M., Lange, T., Ristenpart, T., Bernstein, D.J., Maskiewicz, J., Shacham, H., Fredrikson, M.: On the practical exploitability of Dual EC in TLS implementations. In: Fu, K., Jung, J. (eds.) Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20–22 August, pp. 319–335. USENIX Association (2014)