1. Markoff, J. Flaw Found in an Online Encryption Method, (New York Times, published on Feb. 14, 2012), https://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html (2012).
2. Lenstra, A. K., Hughes, J. P., Augier, M., Bos, J. W., Kleinjung, T. & Wachter, C. Ron was wrong, Whit is right, Santa Barbara: IACR: 17, Cryptology ePrint Archive, Paper 2012/064, Cryptology ePrint Archive: 2012/064, https://eprint.iacr.org/2012/064.pdf (2012).
3. Quantique, SA., What is the Q in QRNG? Random Number Generation. White Paper, https://marketing.idquantique.com/acton/attachment/11868/f-0226/1/ (2020).
4. Calude, C. S. Information and Randomness—An Algorithmic Perspective. https://doi.org/10.1007/978-3-662-04978-5 (Springer, Berlin, 2002).
5. Pironio, S. et al. Random numbers certified by Bell’s theorem. Nature 464, 1021. https://doi.org/10.1038/nature09008 (2010).