{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T01:36:44Z","timestamp":1766281004241},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_29","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"394-408","source":"Crossref","is-referenced-by-count":10,"title":["On the Universality of the Next Bit Test"],"prefix":"10.1007","author":[{"given":"A. W.","family":"Schrift","sequence":"first","affiliation":[]},{"given":"A.","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Blum, M., \u201cIndependent Coin Flips From a Correlated Biased Source: a Finite State Markov Chain\u201d, Proc. 25th FOCS, 1984, pp. 425\u2013433.","DOI":"10.1109\/SFCS.1984.715944"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M., \u201cA Simple Secure Pseudo-Random Generator\u201d, SIAM J. of Computing, Vol. 15, No. 2, 1986, pp. 364\u2013383.","journal-title":"SIAM J. of Computing"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Blum, M., Micali, S., \u201cHow to Generate Cryptographically Strong Sequences of Pseudo-Random Bits\u201d, Proc. 26th FOCS, 1982, pp. 112\u2013117.","DOI":"10.1109\/SFCS.1982.72"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldreich, O., \u201cUnbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity\u201d, Proc. 26th FOCS, 1985, pp. 429\u2013442.","DOI":"10.1109\/SFCS.1985.62"},{"key":"29_CR5","unstructured":"Feldman, D., Impagliazzo, R., Naor, M., Nisan, N., Rudich, S., Shamir, A., \u201cOn Dice and Coins\u201d, ICALP 1989."},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Plumstead, J., \u201cInferring a Sequence Generated by a Linear Congruence\u201d, Proc. 23rd FOCS, 1982, pp. 153\u2013159.","DOI":"10.1109\/SFCS.1982.73"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Santha, M., Vazirani, U.V., \u201cGenerating Quasi-Random Sequences from Slightly-Random Sources\u201d, Proc. 25th FOCS, 1984, pp. 434\u2013440.","DOI":"10.1109\/SFCS.1984.715945"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Schrift, A.W., Shamir, A., \u201cThe Discrete Log is Very Discreet\u201d, Proc. 22nd STOC, 1990, pp. 405\u2013415.","DOI":"10.1145\/100216.100271"},{"key":"29_CR9","first-page":"768","volume":"5","author":"J. Neumann von","year":"1963","unstructured":"von Neumann, J., \u201cVarious Techniques Used in Connection with Random Digits\u201d, Notes by G.E. Forsythe, 1951, Reprinted in von Neumann\u2019s Collected Works, Vol. 5, Pergamon Press, 1963, pp. 768\u2013770.","journal-title":"Notes by G.E. Forsythe"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Vazirani, U.V., Vazirani, V.V., \u201cTrapdoor Pseudo-Random Number Generator with Applications to Protocol Design\u201d, Proc. 24th FOCS, 1983, pp. 23\u201330.","DOI":"10.1109\/SFCS.1983.78"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Yao, A.C., \u201cTheory and Applications of Trapdoor Functions\u201d, Proc. 23rd FOCS, 1982, pp. 80\u201391.","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:13Z","timestamp":1619572813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_29","relation":{},"subject":[]}}