[4]
E. B. Barker and J. M. Kelsey,
“Recommendation for random number generation using deterministic random bit generators,” National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800-90a, 2012. doi:
10.6028/NIST.SP.800-90a.
[5]
J. Bonneau, J. Clark, and S. Goldfeder,
“On Bitcoin as a public randomness source.” Cryptology ePrint Archive, Paper 2015/1015, 2015. Available:
https://eprint.iacr.org/2015/1015
[6]
M. Blum and S. Micali,
“How to Generate Cryptographically Strong Sequences of Pseudorandom Bits,” SIAM J. Comput., vol. 13, no. 4, pp. 850–864, Nov. 1984, doi:
10.1137/0213053.
[10]
W. Diffie and M. Hellman,
“New Directions in Cryptography,” in
IEEE Transactions on Information Theory, 1976, pp. 644–654. doi:
10.1109/TIT.1976.1055638.
[11]
R. L. Rivest, A. Shamir, and L. Adleman,
“A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978, doi:
10.1145/359340.359342.
[13]
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies. Princeton University Press, 2016.
[14]
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten,
“SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies,” in
2015 IEEE Symposium on Security and Privacy, 2015, pp. 104–121. doi:
10.1109/SP.2015.14.