{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T05:24:58Z","timestamp":1734585898206,"version":"3.30.2"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1993,3,1]],"date-time":"1993-03-01T00:00:00Z","timestamp":730944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Cryptology"],"published-print":{"date-parts":[[1993,3]]},"DOI":"10.1007\/bf00198461","type":"journal-article","created":{"date-parts":[[2004,8,29]],"date-time":"2004-08-29T02:50:56Z","timestamp":1093747856000},"page":"119-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Universal tests for nonuniform distributions"],"prefix":"10.1007","volume":"6","author":[{"given":"A. W.","family":"Schrift","sequence":"first","affiliation":[]},{"given":"A.","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF00198461_CR1","unstructured":"Alon, N., and Rabin, M. O., Biased Coins and Randomized Algorithms, Advances in Computing Research, Vol. 5, ed. S. Micali, JAI Press, Greenwich, CT, 1989, pp. 499\u2013507."},{"key":"BF00198461_CR2","doi-asserted-by":"crossref","unstructured":"Blum, M., Independent Coin Flips From a Correlated Biased Source: A Finite State Markov Chain, Proc. 25th FOCS, 1984, pp. 425\u2013433.","DOI":"10.1109\/SFCS.1984.715944"},{"issue":"No. 4","key":"BF00198461_CR3","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1137\/0213053","volume":"Vol. 13","author":"M. Blum","year":"1984","unstructured":"Blum, M., and Micali, S., How To Generate Cryptographically Strong Sequences of Pseudo-Random Bits, SIAM J. Comput., Vol. 13, No. 4, 1984, pp. 850\u2013864. Previous version in Proc. 26th FOCS, 1985.","journal-title":"SIAM J. Comput."},{"key":"BF00198461_CR4","volume-title":"Advances in Computing Research, Vol. 5","author":"R. B. Boppana","year":"1989","unstructured":"Boppana, R. B., and Hirschfeld, R., Pseudorandom Generators and Complexity Classes, Advances in Computing Research, Vol. 5, ed. S. Micali, JAI Press, Greenwick, CT, 1989."},{"key":"BF00198461_CR5","doi-asserted-by":"crossref","unstructured":"Chor, B., and Goldreich, O., Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity, Proc. 26th FOCS, 1985, pp. 429\u2013442.","DOI":"10.1109\/SFCS.1985.62"},{"key":"BF00198461_CR6","unstructured":"Feldman, D., Impagliazzo, R., Naor, M., Nisan, N., Rudich, S., and Shamir, A., On Dice and Coins, Proc. ICALP, 1989."},{"key":"BF00198461_CR7","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/0022-314X(80)90084-0","volume":"Vol. 12","author":"M. O. Rabin","year":"1980","unstructured":"Rabin, M. O., Probabilistic Algorithms for Testing Primality, J. Number Theory, Vol. 12, 1980, pp. 128\u2013138.","journal-title":"J. Number Theory"},{"key":"BF00198461_CR8","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/0022-0000(86)90044-9","volume":"Vol. 33","author":"M. Santha","year":"1986","unstructured":"Santha, M., and Vazirani, U. V., Generating Quasi-Random Sequences from Semi-Random Sources, J. Comput. System Sci., Vol. 33, 1986, pp. 75\u201387. Previous version in Proc. 25th FOCS, 1984.","journal-title":"J. Comput. System Sci."},{"key":"BF00198461_CR9","series-title":"Ph.D. Thesis","volume-title":"Randomness and Hardness of Bit-Sources","author":"A. W. Schrift","year":"1990","unstructured":"Schrift, A. W., Randomness and Hardness of Bit-Sources, Ph.D. Thesis, The Weizmann Institute of Science, Rehovot, Israel, 1990."},{"key":"BF00198461_CR10","doi-asserted-by":"crossref","unstructured":"Schrift, A. W., and Shamir, A., The Discrete Log is Very Discrete, Proc. 22nd STOC, 1990, pp. 405\u2013415.","DOI":"10.1145\/100216.100271"},{"key":"BF00198461_CR11","unstructured":"Schrift, A. W., and Shamir, A, On the Universality of the Next Bit Test, Proc. CRYPTO 90."},{"key":"BF00198461_CR12","doi-asserted-by":"crossref","unstructured":"Vazirani, U. V., and Vazirani, V. V., Trapdoor Pseudo-Random Number Generator with Applications to Protocol Design, Proc. 24th FOCS, 1983, pp. 23\u201330.","DOI":"10.1109\/SFCS.1983.78"},{"key":"BF00198461_CR13","first-page":"36","volume":"Vol. 12","author":"J. Neumann von","year":"1951","unstructured":"von Neumann, J., Various Techniques Used in Connection with Random Digits, Appl. Math. Ser., Vol. 12, 1951, pp. 36\u201338. Reprinted in von Neumann's Collected Works, Vol. 5, Pergamon Press, New York, 1963, pp. 768\u2013770.","journal-title":"Appl. Math. Ser."},{"key":"BF00198461_CR14","doi-asserted-by":"crossref","unstructured":"Yao, A. C., Theory and Applications of Trapdoor Functions, Proc. 23rd FOCS, 1982, pp. 80\u201391.","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00198461.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00198461\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00198461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00198461.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T12:38:46Z","timestamp":1734525526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00198461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,3]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,3]]}},"alternative-id":["BF00198461"],"URL":"https:\/\/doi.org\/10.1007\/bf00198461","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"type":"print","value":"0933-2790"},{"type":"electronic","value":"1432-1378"}],"subject":[],"published":{"date-parts":[[1993,3]]},"assertion":[{"value":"11 January 1991","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 1992","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}