1: \begin{thebibliography}{99.}%
2:
3: \bibitem{Klein08}
4: Klein~A.: Attacks on the RC4 stream cipher. Design. Code. Cryptogr. 48(3), 269--286 (2008)
5:
6: \bibitem{Goldberg96}
7: Goldberg~I., Wagner~I.: Randomness and the Netscape browser. Dr. Dobb's Journal, pp. 66--70 (1996)
8:
9: \bibitem{Gutterman06}
10: Gutterman~Z., Pinkas~B., Reinman~T.: Analysis of the Linux Random Number Generator. Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 371--385 (2006)
11:
12: \bibitem{Dorrendorf09}
13: Dorrendorf~L., Gutterman~Z., Pinkas~B.: Cryptanalysis of the random number generator of the Windows operating system. ACM T. Inform. System 13(1), 10:1--10:32 (2009)
14:
15: \bibitem{BBS86}
16: Blum~L., Blum~M., Shub~M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput 15, 364--383 (1986)
17:
18: \bibitem{Alvarez00}
19: Alvarez~G., Montoya~F., Romera~M., Pastor~G.: Cryptanalysis of a chaotic encryption system. Phys. Lett. A 276(1-4), 191--196 (2000)
20:
21: \bibitem{Alvarez06}
22: Alvarez~G., Li~S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129--2151 (2006)
23:
24: \bibitem{Orue08}
25: Orue~A.~B. et al.: Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems. Phys. Lett. A 372, 5588--5592 (2008)
26:
27: \bibitem{Knuth97}
28: Knuth~D.~E.: The Art of Computer Programming, 3rd~ed. Addison-Wesley, vol. 2, Seminumerical Algorithms (1997)
29:
30: \bibitem{Bellare97}
31: Bellare~M., Goldwasser~S., Micciancio~D.: Pseudo-random number generation within cryptographic algorithms: The dds case. LNCS 1294, 277--291 (1997)
32:
33: \bibitem{SP800-22}
34: Rukhin~A., et al.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications revision-1~ed., National Institute of Standards and Technology (NIST), U.S. Department of Commerce (2008)
35:
36: \bibitem{Marsaglia02}
37: Marsaglia~G., Tsang~W.~W.: Some difficult-to-pass tests of randomness. J. Stat. Softw.~7(3) 1--9 (2002)
38:
39: \end{thebibliography}
40: