1. Schneier B., Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, Wiley Computer Publishing, John Wiley & Sons, Inc., 784 (1996)
2. Random Number Generators
3. Hörmann W., Leydold J., Derflinger G., Automatic Nonuniform Random Veriate Generation. Spr.-Verl., New York, (2004)
4. Chugunkov E.V., Methods and tools to evaluate the quality of pseudo-random sequence generators, focused on solving problems of information security: Textbook/M.: NEYAU MIFI, 236 (2012)
5. Matsumoto M., Nishimura T., Hadita M., Saito M.. Cryptographic Mersenne Twister and Fubuki Stream/Block Cipher. (2005)