1. Ron was wrong, Whit is right;Lenstra,2012
2. N. Heninger, Z. Durumeric, E. Wustrow, J.A. Halderman, Mining your Ps and Qs: detection of widespread weak keys in network devices, in: Proceedings of the 21st USENIX Security Symposium.
3. On the impossibility of private key cryptography with weakly random keys;McInnes,1991
4. Weak randomness seriously limits the security of quantum key distribution;Bouda;Phys. Rev. A,2012
5. Weak randomness in device-independent quantum key distribution and the advantage of using high-dimensional entanglement;Huber;Phys. Rev. A,2013