1. Ristenpart, T., and Yilek, S. (March, January 28). When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. Proceedings of the Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA.
2. Ishai, Y., and Rijmen, V. (2019). An analysis of NIST SP 800-90A. Advances in Cryptology—EUROCRYPT 2019, Springer International Publishing.
3. Bernstein, D.J., Lange, T., and Niederhagen, R. (2015). Dual EC: A standardized back door. Cryptol. ePrint Arch., 767. Available online: https://eprint.iacr.org/2015/767.
4. Tang, Q., and Teague, V. (2024). On the possibility of a backdoor in the Micali-Schnorr generator. Public-Key Cryptography—PKC 2024, Springer Nature.
5. Barker, E., and Kelsey, J. (2015). Recommendation for Random Number Generation Using Deterministic Random Bit Generators, NIST (National Institute of Standards and Technology). Special Publication.