1. C.L. Phillips, J.A. Anderson, S.C. Glotzer, J. Comput. Phys. 230, 7191 (2011)
2. N. Ferguson, B. Schneier, T. Kohno, Cryptography Engineering: Design Principles and Practical Applications (Wiley Publishing, 2010)
3. S. Banerjee, Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption (IGI Global, 2010)
4. G. Marsaglia, Diehard test suite, 1996, http://www.stat.fsu.edu/pub/diehard/
5. NIST, FIPS PUB 140-2, security requirements for cryptographic modules (NIST, Gaithersburg, MD, 2001)