\begin{thebibliography}{10} \bibitem{Frauchiger2013} Daniela Frauchiger and Renato Renner. \newblock Truly random number generation: an example. \newblock {\em Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X}, Oct 2013. \bibitem{Gabriel2010} Christian Gabriel, Christoffer Wittmann, Denis Sych, Ruifang Dong, Wolfgang Mauerer, Ulrik~L. Andersen, Christoph Marquardt, and Gerd Leuchs. \newblock A generator for unique quantum random numbers based on vacuum states. \newblock {\em Nature Photon}, 4(10):711–715, Aug 2010. \bibitem{Hellekalek1998} P.~Hellekalek. \newblock Good random number generators are (not so) easy to find. \newblock {\em Mathematics and Computers in Simulation}, 46(5-6):485–505, Jun 1998. \bibitem{INTEL} Benjamin Jun and Paul Kocher. \newblock The intel random number generator. \newblock 1999. \bibitem{Kanter2009} Ido Kanter, Yaara Aviad, Igor Reidler, Elad Cohen, and Michael Rosenbluh. \newblock An optical ultrafast random bit generator. \newblock {\em Nature Photon}, 4(1):58–61, Dec 2009. \bibitem{:/content/aip/journal/apl/98/23/10.1063/1.3597793} T.~Symul, S.~M. Assad, and P.~K. Lam. \newblock Real time demonstration of high bitrate quantum random number generation with coherent laser light. \newblock {\em Applied Physics Letters}, 98(23):--, 2011. \bibitem{Kwok2011} Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, and Chik-How Tan. \newblock A comparison of post-processing techniques for biased random number generators. \newblock {\em Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication}, page 175–190, 2011. \bibitem{vonneumann:51} John von Neumann. \newblock {Various Techniques Used in Connection with Random Digits}. \newblock {\em J. Res. Nat. Bur. Stand.}, 12:36--38, 1951. \bibitem{Schroeder:52083} Manfred. Schroeder. \newblock {\em Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity /; Fifth Edition.} \newblock Springer Berlin Heidelberg,, Berlin, Heidelberg :, 2009. \bibitem{Massey} Anne Canteaut. \newblock Berlekamp-massey algorithm. \newblock In HenkC.A. van Tilborg, editor, {\em Encyclopedia of Cryptography and Security}, pages 29--30. Springer US, 2005. \bibitem{lablans2013methods} P.~Lablans. \newblock Methods and systems for processing of n-state symbols with xor and equality binary functions, January~29 2013. \newblock US Patent 8,364,977. \end{thebibliography}