1. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
2. Schindler, W.: Random number generators for cryptographic applications. In: Koc, C.K. (ed.) Cryptographic Engineering. Signals and Communication Theory. Springer, Berlin (2009)
3. Gauravaram, P., Knudsen, L.R., Matusievicz, K., Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: Grøstl—a SHA-3 candidate. 31 Oct 2008. http://www.groestl.info/Groestl.pdf
4. Stojanovski, T., Kocarev, L.: Chaos-based random number generators—Part I: Analysis. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 48, 281–288 (2001)
5. Wang, X., Qin, X.: A new pseudo-random number generator based on CML and chaotic iteration. Nonlinear Dyn. 70, 1589–1592 (2012)