Emergent Scientist
Volume 1, 2017
International Physicists' Tournament 2016
Article Number 2
Number of page(s) 8
Published online 31 August 2017
  1. W. Diffie, M.E. Hellman, Privacy and authentication: an introduction to cryptography, Proc. IEEE 67, 397 (1979) [CrossRef]
  2. G.B. Agnew, Random sources for cryptographic systems (Springer, Berlin, Heidelberg, 1988), pp. 77–81
  3. D.E. Knuth, The art of computer programming (Addison-Wesley Pub (Sd), Reading, MA, 1981), Vol. 2, 2nd ed.
  4. NIST, Statistical test suite (2014),
  5. I.N. Kovalenko, Durri-Hamdani, Distribution of the linear rank of a random matrix, Theor. Prob. Appl. 17, 342 (1972) [CrossRef]
  6. A. Klein, Linear feedback shift registers (Springer, London, 2013), pp. 17–58
  7. J. von Neumann, Various techniques used in connection with random digits, J. Res. Nat. Bur. Stand. 12, 36 (1951)
  8. P. Elias, The efficient construction of an unbiased random sequence, Ann. Math. Statist. 43, 865 (1972) [CrossRef]
  9. Y. Peres, Iterating von Neumann’s procedure for extracting random bits, Ann. Statist. 20, 590 (1992) [CrossRef]
  10. M.H. DeGroot, M.J. Schervish, Probability and statistics. Addison-Wesley series in statistics (Addison-Wesley, Boston, MA, 2002)
  11. J. Walker, Hotbits (1996),
  12. N. Barbosa, Quantum random number generators using photons, Undergraduate thesis, Universidad de los Andes, 2013, pp. 28–34
  13. IDQ, Random number generation using quantum physics (2010),

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.