@inproceedings{Blum&Micali:1982,
key = "Blum and Micali 1982",
author = "M. Blum and S. Micali",
title = "How to generate cryptographically strong sequences of
pseudo random bits",
booktitle = "Proc. 23rd Symp. Found. Comp. Sci.",
year = 1982,
pages = "112-117",
comment = "new version in 1984 SIAM J. Comput."}
@article{Blum&Blum&Shub:1986,
key = "Blum, Blum, and Shub 1986",
author = "L. Blum and M. Blum and M. Shub",
title = "A simple unpredictable pseudo-random number generator",
journal = SIAMJC,
volume = 15,
year = 1986,
pages = "364-383"}
@inproceedings{Goldreich&Goldwasser&Micali:1984,
key = "Goldreich, Goldwasser, and Micali 1984",
author = "O. Goldreich and S. Goldwasser and S. Micali",
title = "How to construct random functions",
year = 1984,
booktitle = "Proc. 25th Symp. Found. Comp. Sci.",
pages = "464-479"}
@inproceedings{Yao:1982,
key = "Yao 1982",
author = "A. Yao",
title = "Theory and applications of trapdoor functions",
year = 1982,
booktitle = FOCS82,
pages = "80-91"}
@inproceedings{Alexi&Chor&Goldreich&Schnorr:1984,
key = "Alexi, Chor, Goldreich, and Schnorr 1984",
author = "W. Alexi and B. Chor and O. Goldreich and C. P. Schnorr",
title = "{RSA/Rabin} bits are {$1/2 + 1/poly(\log N)$} secure",
year = 1984,
booktitle = FOCS84,
pages = "449-457"}
@inproceedings{Ben-Or&Chor&Shamir:1983,
key = "Ben-Or, Chor, and Shamir 1983",
author = "M. Ben-Or and B. Chor and A. Shamir",
title = "On the cryptographic Security of Single {RSA} Bits",
year = 1983,
booktitle = STOC83,
pages = "421-430"}
@inproceedings{Plumstead:1982,
key = "Plumstead 1982",
author = "J. Plumstead",
title = "Inferring a Sequence Generated by a Linear Congruence",
year = 1982,
booktitle = "Proc. 23rd IEEE Symp. Found. Comp. Sci.",
pages = "153-159"}
@inproceedings{Frieze&Kannan&Lagarias:1984,
key = "Frieze, Kannan, and Lagarias 1984",
author = "A. M. Frieze and R. Kannan and J. C. Lagarias",
title = "Linear Congruential Generators Do Not Produce Random
Sequences",
year = 1984,
booktitle = "Proc. 25th Symp. Found. Comp. Sci.",
pages = "480-484"}
@article{Reeds:1977,
key = "Reeds 1977",
author = "J. Reeds",
title = "Cracking a Random Number Generator",
journal = "Cryptologia",
volume = 1,
pages = "20-26",
year = 1977}
@article{Welch&Scholtz:1979,
key = "Welch and Scholtz 1979",
author = "L. R. Welch and R. A. Scholtz",
title = "Continued Fractions and {Berlekamp's} Algorithm",
journal = IEEE-IT,
volume = "IT-25",
year = 1979,
pages = "19-27"}
@article{Cheng:1984,
key = "Cheng 1984",
author = "U. Cheng",
title = "On the Continued Fraction and {Berlekamp's} Algorithm",
journal = IEEE-IT,
volume = "IT-30",
year = 1984,
pages = "541-544"}
@incollection{Dai&Zeng:1990,
key = "Dai and Zeng 1990",
author = "Z. Dai and K. Zeng",
title = "Continued fractions and the {Berlekamp-Massey} algorithm",
booktitle = AUSCRYPT90,
editor = "J. Seberry and J. Pieprzyk",
publisher = SV,
series = LNICS,
volume = 453,
year = 1990,
pages = "24-31"}
@article{Dubner&Dubner:1986,
key = "Dubner and Dubner 1986",
author = "H. Dubner and R. Dubner",
title = "The development of a powerful, low-cost computer for
number theory applications",
journal = JRM,
volume = 18,
year = 1986,
pages = "81-86"}
@article{Diffie&Hellman:1976,
key = "Diffie and Hellman 1976",
author = "W. Diffie and M. E. Hellman",
title = "New directions in cryptography",
journal = IEEE-IT,
volume = "IT-22",
year = 1976,
pages = "644-654"}
@article{Rivest&Shamir&Adleman:1978,
key = "Rivest, Shamir, and Adleman 1978",
author = "R. L. Rivest and A. Shamir and L. Adleman",
title = "A method for obtaining digital signatures and public-key
cryptosystems",
journal = CACM,
volume = 21,
year = 1978,
pages = "120-126"}
@article{Jung:1987,
key = "Jung 1987",
author = "A. Jung",
title = "Implementing the {RSA} cryptosystem",
journal = CAS,
volume = 6,
year = 1987,
pages = "342-350"}
@inproceedings{Kaliski:1986,
key = "Kaliski 1986",
author = "Kaliski, Jr., B. S.",
title = "A pseudo-random bit generator based on elliptic
logarithms",
booktitle = CRYPTO86,
year = 1986,
pages = "84-103",
editor = "A. M. Odlyzko",
publisher = SV}
@techreport{Rabin:1979,
key = "Rabin 1979",
author = "M. O. Rabin",
title = "Digitalized signatures and public-key functions as
intractable as factorization",
institution = "MIT Laboratory for Computer Science",
number = "TR-212",
year = 1979}
@incollection{Girault&Toffin&Vallee:1990,
key = "Girault, Toffin, and {Vall\'ee} 1990",
author = "M. Girault and P. Toffin and B. {Vall\'ee}",
title = "Computation of approximate {$L$-th} roots modulo $n$
and application to cryptography",
booktitle = CRYPTO86,
editor = "S. Goldwasser",
series = LNICS,
publisher = SV,
number = 403,
year = 1990,
pages = "100-117"}
@article{Koblitz:1989,
key = "Koblitz 1989",
author = "N. Koblitz",
title = "Hyperelliptic cryptosystems",
journal = "J. Cryptology",
volume = 1,
year = 1989,
pages = "139-150"}
@article{Boyar:1989a,
key = "Boyar 1989a",
author = "J. Boyar",
title = "Inferring sequences produced by a linear congruential
generator missing low-order bits",
journal = "J. Cryptology",
volume = 1,
year = 1989,
pages = "177-184"}
@article{Boyar:1989b,
key = "Boyar 1989b",
author = "J. Boyar",
title = "Inferring sequences produced by pseudo-random number
generators",
journal = JACM,
volume = 36,
year = 1989,
pages = "129-141"}
@article{McCurley:1989,
key = "McCurley 1989",
author = "K. S. McCurley",
title = "A key distribution system equivalent to factoring",
journal = "J. Cryptology",
volume = 1,
year = 1988,
pages = "95-105"}
@article{Loxton&Khoo&Bird&Seberry:1992,
key = "Loxton, Khoo, Bird, and Seberry 1990",
author = "J. H. Loxton and D. S. P. Khoo and G. J. Bird and J. Seberry",
title = "A cubic {RSA} code equivalent to factorisation",
journal = JC,
volume = 5,
year = 1992,
pages = "139-150"}
@article{Buchmann&Williams:1988,
author = "J. Buchmann and H. C. Williams",
key = "Buchmann and Williams 1988",
title = "A key-exchange system based on imaginary quadratic fields",
journal = "J. Cryptology",
volume = 1,
year = 1988,
pages = "107-118"}
@article{Zierler:1959,
key = "Zierler 1959",
author = "N. Zierler",
title = "Linear recurring sequences",
journal = JSIAM,
volume = 7,
year = 1959,
pages = "31-48"}
@inproceedings{Niederreiter:1982,
key = "Niederreiter 1982",
author = "H. Niederreiter ",
title = "Optimal multipliers for linear congruential
pseudo-random numbers: the decimal case",
booktitle = "Proc. 3rd Pannonian Symp. Math. Stat.",
editor = "J Mogyor{\'odi} and I. Vincze and W. Wertz",
year = 1982,
pages = "255-269"}
@article{Borosh&Niederreiter:1983,
key = "Borosh and Niederreiter 1983",
author = "I. Borosh and H. Niederreiter ",
title = "Optimal multipliers for pseudo-random number
generation by the linear congruential method",
journal = BIT,
volume = 23,
year = 1983,
pages = "65-74"}
@article{Chor&Rivest:1988,
key = "Chor and Rivest 1988",
author = "B. Chor and R. L. Rivest",
title = "A knapsack-type public key cryptosystem
based on arithmetic in finite fields",
journal = IEEE-IT,
volume = 34,
year = 1988,
pages = "901-909"}
@incollection{Buchmann&Dullmann&Williams:1990,
key = "Buchmann, {D\"ullman}, and Williams 1990",
author = "J. A. Buchmann and S. {D\"ullmann} and H. C. Williams",
title = "On the complexity and efficiency of a new key exchange system",
booktitle = EUROCRYPT89,
editor = "J.-J. Quisquater and J. Vandewalle",
publisher = SV,
year = 1990,
pages = "597-616"}
@article{Marsaglia&Zaman:1991,
key = "Marsaglia and Zaman 1991",
author = "G. Marsaglia and A. Zaman",
title = "A new class of random number generators",
journal = AAP,
volume = 1,
year = 1991,
pages = "462-480"}
@incollection{Krawczyk:1990,
key = "Krawczyk 1990",
author = "H. Krawczyk",
title = "How to predict congruential generators",
booktitle = CRYPTO89,
editor = "G. Brassard",
publisher = SV,
year = 1990,
series = LNICS,
volume = 435,
pages = "138-153"}
@article{Krawczyk:1992,
key = "Krawczyk 1992",
author = "H. Krawczyk",
title = "How to predict congruential generators",
journal = JA,
volume = 13,
year = 1992,
pages = "527-545"}
@incollection{Mehta:1990,
key = "Mehta 1990",
author = "M. L. Mehta",
title = "Some remarks on random number generators",
booktitle = "Number Theory and Physics",
editor = "J. M. Luck and P. Moussa and M. Waldschmidt",
publisher = SV,
year = 1990,
series = "Springer Proceedings in Physics",
volume = 47,
pages = "253-259"}
@unpublished{Bach:1993,
key = "Bach 1993",
author = "E. Bach",
title = "Efficient prediction of {Marsaglia/Zaman} random number generators",
note = "Unpublished manuscript",
year = 1993}
@article{Massey:1969,
key = "Massey 1969",
author = "J. L. Massey",
title = "Shift register synthesis and {BCH} decoding",
journal = IEEE-IT,
volume = "IT-15",
year = 1969,
pages = "18-27"}
@article{Cusick:1995,
key = "Cusick 1995",
author = "T. W. Cusick",
title = "Properties of the $x^2$ mod ${N}$ pseudorandom number generator",
journal = IEEE-IT,
volume = 41,
year = 1995,
pages = "1155-1159"}
@article{Dabiri&Blake:1995,
key = "Dabiri and Blake 1995",
author = "D. Dabiri and I. F. Blake",
title = "Fast parallel algorithms for decoding {Reed-Solomon} codes
based on remainder polynomials",
journal = IEEE-IT,
volume = 41,
year = 1995,
pages = "873-885"}
@article{CohenS:1994,
key = "S. Cohen 1994",
author = "S. D. Cohen",
title = "Polynomial factorisation, graphs, designs, and codes",
booktitle = "Finite Fields: Theory, Applications, and Algorithms",
series = "Contemporary Mathematics",
volume = 168,
publisher = AMS,
year = 1994,
editor = "G. L. Mullen and P. J.-S. Shiue",
pages = "23-32"}
@article{Douthett&Entringer&Mullhaupt:1992,
key = "Douthett, Entringer, and Mullhaupt 1992",
author = "J. Douthett and R. Entringer and A. Mullhaupt",
title = "Musical scale construction: the continued fraction compromise",
journal = UM,
volume = 42,
year = 1992,
pages = "97-113"}