1. Endre Abraham. 2018. Post-quantum verifiable random functions from ring signatures. Cryptology ePrint Archive (2018).
2. Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz. 2006. Computationally private randomizing polynomials and their applications. computational complexity 15, 2 (2006), 115–162.
3. Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, and Amit Sahai. 2016. Verifiable functional encryption. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 557–587.
4. Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, and Amit Sahai. 2017. A note on VRFs from verifiable functional encryption. Cryptology ePrint Archive (2017).
5. Lawrence E Bassham III, Andrew L Rukhin, Juan Soto, James R Nechvatal, Miles E Smid, Elaine B Barker, Stefan D Leigh, Mark Levenson, Mark Vangel, David L Banks, 2010. Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology.