{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:24:32Z","timestamp":1773512672043,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:00:00Z","timestamp":1711584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:00:00Z","timestamp":1711584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100005632","name":"NCBiR","doi-asserted-by":"crossref","award":["POIR.01.01.01-00-0173\/15 Jurand"],"award-info":[{"award-number":["POIR.01.01.01-00-0173\/15 Jurand"]}],"id":[{"id":"10.13039\/501100005632","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-024-04335-8","type":"journal-article","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T11:01:39Z","timestamp":1711623699000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["New concepts and construction of quantum random number generators"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5325-3728","authenticated-orcid":false,"given":"Piotr","family":"J\u00f3\u017awiak","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6946-2495","authenticated-orcid":false,"given":"Janusz E.","family":"Jacak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2645-7909","authenticated-orcid":false,"given":"Witold A.","family":"Jacak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,3,28]]},"reference":[{"key":"4335_CR1","doi-asserted-by":"crossref","DOI":"10.1103\/RevModPhys.94.025008","volume":"94","author":"C Portmann","year":"2022","unstructured":"Portmann, C., Renner, R.: Security in quantum cryptography. Rev. Mod. Phys. 94, 025008 (2022)","journal-title":"Rev. Mod. Phys."},{"key":"4335_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-64360-7","volume-title":"Quantum Cryptography: From Key Distribution to Conference Key Agreement","author":"F Grasselli","year":"2021","unstructured":"Grasselli, F.: Quantum Cryptography: From Key Distribution to Conference Key Agreement. Springer Nature Switzerland AG, Cham (2021)"},{"key":"4335_CR3","volume-title":"Introduction to Quantum Cryptography","author":"M Jacak","year":"2013","unstructured":"Jacak, M., J\u00f3\u017awiak, I., Jacak, J., Gruber, J., Jacak, W.: Introduction to Quantum Cryptography. WUST UP, Wroc\u0142aw (2013)"},{"key":"4335_CR4","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"4335_CR5","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/S0304-3975(98)00075-9","volume":"207","author":"A Kolmogorov","year":"1998","unstructured":"Kolmogorov, A.: On tables of random numbers. Theor. Comput. Sci. 207, 387 (1998)","journal-title":"Theor. Comput. Sci."},{"key":"4335_CR6","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15, 364 (1986)","journal-title":"SIAM J. Comput."},{"key":"4335_CR7","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1145\/502090.502099","volume":"48","author":"L Trevisan","year":"2001","unstructured":"Trevisan, L.: Extractors and pseudorandom generators. J. ACM 48, 860 (2001)","journal-title":"J. ACM"},{"key":"4335_CR8","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1038\/nphoton.2008.227","volume":"2","author":"A Uchida","year":"2008","unstructured":"Uchida, A., Amano, K., Inoue, M., Hirano, K., Naito, S., Someya, H., Oowada, I., Kurashige, T., Shiki, M., Yoshimori, S., Yoshimura, K., Davis, P.: Fast physical random bit generation with chaotic semiconductor lasers. Nat. Photon. 2, 728 (2008)","journal-title":"Nat. Photon."},{"key":"4335_CR9","doi-asserted-by":"crossref","unstructured":"Ma, X., Yuan, X., Cao, Z., Qi, B., Zhang, Z.: Quantum random number generation. Nat. Electron. (2016)","DOI":"10.1038\/npjqi.2016.21"},{"key":"4335_CR10","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M. , Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 Revision 1a, 2010. Revisor: Lawrence E. Bassham III"},{"key":"4335_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"RA Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, New York (1986)"},{"key":"4335_CR12","volume":"89","author":"H Collantes","year":"2017","unstructured":"Collantes, H., Escartin, M.G., Carlos, J.: Quantum random number generators. Rev. Mod. Phys. 89, 015004 (2017)","journal-title":"Rev. Mod. Phys."},{"key":"4335_CR13","doi-asserted-by":"crossref","first-page":"16021","DOI":"10.1038\/npjqi.2016.21","volume":"2","author":"X Ma","year":"2016","unstructured":"Ma, X., Yuan, X., Cao, Z., Qi, B., Zhang, Z.: Quantum random number generation. Quantum Inf. 2, 16021 (2016)","journal-title":"Quantum Inf."},{"key":"4335_CR14","doi-asserted-by":"crossref","first-page":"1640009","DOI":"10.1142\/S0219749916400098","volume":"14","author":"A Khrennikov","year":"2016","unstructured":"Khrennikov, A.: Randomness: quantum versus classical. Int. J. Quantum Inform. 14, 1640009 (2016)","journal-title":"Int. J. Quantum Inform."},{"key":"4335_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-72596-3","volume-title":"Quantum Random Number Generation. Theory and Practice","author":"C Kollmitzer","year":"2020","unstructured":"Kollmitzer, C., Schauer, S., Rass, S., Rainer, B.: Quantum Random Number Generation. Theory and Practice. Springer, Berlin (2020)"},{"key":"4335_CR16","volume":"89","author":"M Herrero-Collantes","year":"2016","unstructured":"Herrero-Collantes, M., Garcia-Escartin, J.C.: Quantum random number generators. Rev. Modern Phys. 89, 015004 (2016)","journal-title":"Rev. Modern Phys."},{"key":"4335_CR17","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1080\/01621459.1949.10483310","volume":"44","author":"N Metropolis","year":"1949","unstructured":"Metropolis, N., Ulam, S.: The Monte Carlo method. J. Am. Stat. Assoc. 44, 335 (1949)","journal-title":"J. Am. Stat. Assoc."},{"key":"4335_CR18","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1063\/1.1699114","volume":"21","author":"N Metropolis","year":"1953","unstructured":"Metropolis, N., Rosenbluth, A.W., Rosenbluth, M.N., Teller, A.M., Teller, E.: Equation of state calculations by fast computing machines. J. Chem. Phys. 21, 1087 (1953)","journal-title":"J. Chem. Phys."},{"key":"4335_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2960-3","volume-title":"Random Number Generation and Monte Carlo Methods","author":"JE Gentle","year":"1998","unstructured":"Gentle, J.E.: Random Number Generation and Monte Carlo Methods. Springer, Berlin (1998)"},{"key":"4335_CR20","volume-title":"Mathematical Statistics and Data Analysis","author":"JA Rice","year":"1995","unstructured":"Rice, J.A.: Mathematical Statistics and Data Analysis, 2nd edn. Duxbury Press, Belmont (1995)","edition":"2"},{"key":"4335_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-9346-7","volume-title":"Elementary Probability Theory with Stochastic Processes","author":"KL Chung","year":"1979","unstructured":"Chung, K.L.: Elementary Probability Theory with Stochastic Processes. Springer, New York (1979)"},{"key":"4335_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4374-8","volume-title":"Probability","author":"J Pitman","year":"1993","unstructured":"Pitman, J.: Probability. Springer, New York (1993)"},{"key":"4335_CR23","volume-title":"Cryptographic Pseudo-random Numbers in Simulation","author":"N Maclaren","year":"1993","unstructured":"Maclaren, N.: Cryptographic Pseudo-random Numbers in Simulation. Cambridge Security Workshop on Fast Software Encryption. R. Anderson, Cambridge (1993)"},{"key":"4335_CR24","unstructured":"Knuth, D.E.: The Art of Computer Programming. Vol 2: Seminumerical Algorithms. 3rd ed. Addison-Wesley, Reading (1998)"},{"key":"4335_CR25","unstructured":"Wolfram. RandomChoice, 2014. http:\/\/reference.wolfram.com\/language\/ref\/RandomChoice.html. Accessed on January 5 2021"},{"key":"4335_CR26","volume-title":"Combinatorial Chance","author":"FN David","year":"1962","unstructured":"David, F.N., Barton, D.E.: Combinatorial Chance. Hafner Publishing Co., New York (1962)"},{"key":"4335_CR27","doi-asserted-by":"crossref","unstructured":"Zubarew, D.N.: Nonequilibrium Statistical Thermodynamics. MIR Publishers, Moscow (1973)","DOI":"10.21236\/AD0784411"},{"key":"4335_CR28","doi-asserted-by":"crossref","first-page":"2083","DOI":"10.1073\/pnas.93.5.2083","volume":"93","author":"S Pincus","year":"1996","unstructured":"Pincus, S., Singer, B.H.: Randomness and degrees of irregularity. Proc. Natl. Acad. Sci. U.S.A. 93, 2083\u20132088 (1996)","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"4335_CR29","doi-asserted-by":"crossref","unstructured":"Fischer, V.: A Closer Look at Security in Random Number Generators Design, pages 167\u2013182. Springer Berlin Heidelberg, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-29912-4_13"},{"key":"4335_CR30","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","volume":"574","author":"F Arute","year":"2019","unstructured":"Arute, F., et al.: Quantum supremacy using a programmable superconducting processor. Nature 574, 505 (2019)","journal-title":"Nature"},{"key":"4335_CR31","unstructured":"D-Wave Systems Inc. D-Wave Quantum Computing, 2014. https:\/\/www.dwavesys.com\/quantum-computing. Accessed on: January 5 2021"},{"key":"4335_CR32","volume-title":"Quantum Computation and Quantum Information","author":"M Nielsen","year":"2010","unstructured":"Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2010)"},{"key":"4335_CR33","volume-title":"Mathematical Foundations of Quantum Mechanics","author":"J von Neumann","year":"1955","unstructured":"von Neumann, J.: Mathematical Foundations of Quantum Mechanics. Princeton University Press, Princeton (1955)"},{"key":"4335_CR34","doi-asserted-by":"crossref","first-page":"1862","DOI":"10.1103\/PhysRevD.26.1862","volume":"26","author":"W \u017burek","year":"1982","unstructured":"\u017burek, W.: Environment-induced superselection rules. Phys. Rev. D 26, 1862 (1982)","journal-title":"Phys. Rev. D"},{"key":"4335_CR35","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1103\/RevModPhys.75.715","volume":"75","author":"W \u017burek","year":"2003","unstructured":"\u017burek, W.: Decoherence. Rev. Modern Phys. 75, 715 (2003)","journal-title":"Rev. Modern Phys."},{"key":"4335_CR36","volume-title":"Quantum Mechanics PWN. Non-relativistic Theory","author":"L Landau","year":"2012","unstructured":"Landau, L., Lifschitz, L.: Quantum Mechanics PWN. Non-relativistic Theory. Elesiver, Amsterdam (2012)"},{"key":"4335_CR37","first-page":"75689","volume":"18","author":"ECG Sudarshan","year":"1977","unstructured":"Sudarshan, E.C.G., Misra, B.: The Zeno\u2019s paradox in quantum theory. J. Math. Phys. 18, 75689 (1977)","journal-title":"J. Math. Phys."},{"key":"4335_CR38","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1038\/s41598-019-56706-2","volume":"10","author":"JE Jacak","year":"2020","unstructured":"Jacak, J.E., Jacak, W.A., Donderowicz, W.A., Jacak, L.: Quantum random number generators with entanglement for public randomness testing. Sci. Rep. 10, 164 (2020)","journal-title":"Sci. Rep."},{"key":"4335_CR39","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W Wootters","year":"1982","unstructured":"Wootters, W., \u017burek, W.: A single quantum cannot be cloned. Nature 299, 802 (1982)","journal-title":"Nature"},{"key":"4335_CR40","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1038\/35000514","volume":"403","author":"J Pan","year":"2000","unstructured":"Pan, J., Bouwmeester, D., Daniell, M., Weinfurter, H., Zeilinger, A.: Experimental test of quantum nonlocality in three-photon Greenberger-Horne-Zeilinger entanglement. Nature 403, 515 (2000)","journal-title":"Nature"},{"key":"4335_CR41","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1103\/PhysRevLett.82.1345","volume":"82","author":"D Bouwmeester","year":"1999","unstructured":"Bouwmeester, D., Pan, J., Daniell, M., Weinfurter, H., Zeilinger, A.: Observation of three-photon Greenberger-Horne-Zeilinger entanglement. Phys. Rev. Lett. 82, 1345 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"4335_CR42","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1038\/s41586-022-04987-5","volume":"608","author":"P Thomas","year":"2022","unstructured":"Thomas, P., Ruscio, L., Morin, O., Rempe, G.: Efficient generation of entangled multiphoton graph states from a single atom. Nature 608, 677 (2022)","journal-title":"Nature"},{"key":"4335_CR43","volume":"131","author":"Y Deng","year":"2023","unstructured":"Deng, Y., Gu, Y., Liu, H., Gong, S., Su, H., Zhang, Z., Tang, H., Jia, M., Xu, J., Chen, M., Qin, J., Peng, L., Yan, J., Hu, Y., Huang, J., Li, H., Li, Y., Chen, Y., Jiang, X., Gan, L., Yang, G., You, L., Li, L., Zhong, H., Wang, H., Liu, N., Renema, J., Lu, C., Pan, J.: Gaussian boson sampling with pseudo-photon-number-resolving detectors and quantum computational advantage. Phys. Rev. Lett. 131, 150601 (2023)","journal-title":"Phys. Rev. Lett."},{"key":"4335_CR44","unstructured":"Reuters. PsiQuantum targets first commercial quantum computer in under six years, [Online]. Avaliable: https:\/\/www.reuters.com\/technology\/psiquantum-targets-first-commercial-quantum-computer-under-six-years\/. Accessed on: 2023"},{"key":"4335_CR45","first-page":"1","volume":"37B","author":"JM Leinaas","year":"1977","unstructured":"Leinaas, J.M., Myrheim, J.: On the theory of identical particles. Nuovo Cimmento 37B, 1 (1977)","journal-title":"Nuovo Cimmento"},{"key":"4335_CR46","doi-asserted-by":"crossref","first-page":"16108","DOI":"10.1038\/s41598-021-95388-7","volume":"11","author":"MM Jacak","year":"2021","unstructured":"Jacak, M.M., J\u00f3\u017awiak, P., Niemczuk, J., Jacak, J.E.: Quantum generators of random numbers. Sci. Rep. 11, 16108 (2021)","journal-title":"Sci. Rep."},{"key":"4335_CR47","doi-asserted-by":"crossref","first-page":"1630002","DOI":"10.1142\/S0219749916300023","volume":"14","author":"M Jacak","year":"2016","unstructured":"Jacak, M., Jacak, J., J\u00f3\u017awiak, P., J\u00f3\u017awiak, I.: Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks. Int. J. Quantum Inf. 14, 1630002 (2016)","journal-title":"Int. J. Quantum Inf."},{"key":"4335_CR48","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1364\/AOP.361502","volume":"12","author":"S Pirandola","year":"2020","unstructured":"Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J.L., Razavi, M., Shamsul Shaari, J., Tomamichel, M., Usenko, V.C., Vallone, G., Villoresi, P., Wallden, P.: Advances in quantum cryptography. Adv. Opt. Photon. 12, 1012 (2020)","journal-title":"Adv. Opt. Photon."},{"key":"4335_CR49","first-page":"1","volume":"2","author":"D Bacco","year":"2019","unstructured":"Bacco, D., Da Lio, B., Cozzolino, D., Da Ros, F., Guo, X., Ding, Y., Sasaki, Y., Aikawa, K., Miki, S., Terai, H., Yamashita, T., Neergaard-Nielsen, J.S., Galili, M., Rottwitt, K., Andersen, U.L., Morioka, T., Oxenlowe, L.K.: Boosting the secret key rate in a shared quantum and classical fibre communication system. Commun. Phys. Nature 2, 1 (2019)","journal-title":"Commun. Phys. Nature"},{"key":"4335_CR50","first-page":"600","volume":"64","author":"M Pivoluska","year":"2014","unstructured":"Pivoluska, M., Plesch, M.: Device independent random number generation. Acta Phys. Slovaca. 64, 600\u2013663 (2014)","journal-title":"Acta Phys. Slovaca."},{"key":"4335_CR51","volume-title":"Speakable and Unspeakable in Quantum Mechanics","author":"JS Bell","year":"1987","unstructured":"Bell, J.S.: Speakable and Unspeakable in Quantum Mechanics. Cambridge University Press, Cambridge (1987)"},{"key":"4335_CR52","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1103\/PhysRevLett.23.880","volume":"23","author":"JF Clauser","year":"1969","unstructured":"Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880 (1969)","journal-title":"Phys. Rev. Lett."},{"key":"4335_CR53","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","volume":"1","author":"JS Bell","year":"1964","unstructured":"Bell, J.S.: On the Einstein Podolsky Rosen paradox. Physics 1, 195\u2013200 (1964)","journal-title":"Physics"},{"key":"4335_CR54","volume":"91","author":"X Yuan","year":"2015","unstructured":"Yuan, X., Cao, Z., Ma, X.: Randomness requirement on the Clauser\u2013Horne\u2013Shimony\u2013Holt Bell test in the multiple-run scenario. Phys. Rev. A 91, 032111 (2015)","journal-title":"Phys. Rev. A"},{"key":"4335_CR55","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1038\/507421a","volume":"507","author":"ND Mermin","year":"2014","unstructured":"Mermin, N.D.: Physics: QBism puts the scientist back into science. Nature 507, 421\u2013423 (2014)","journal-title":"Nature"},{"key":"4335_CR56","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511791239","volume-title":"Intruductory Quantum Optics","author":"C Gerry","year":"2004","unstructured":"Gerry, C., Knight, P.: Intruductory Quantum Optics. Cambridge University Press, Cambridge (2004)"},{"key":"4335_CR57","unstructured":"Doganaksoy, A., Ege, B., Mus, L.: Extended results for independence and sensitivity of nist randomness tests. ISC Turkey (2008)"},{"key":"4335_CR58","first-page":"18","volume":"18","author":"M Sys","year":"2015","unstructured":"Sys, M., Riha, Z., Matyas, V., Marton, K., Suciu, A.: On the interpretation of results from the nist statistical test suite. Rom. J. Inf. Sci. Technol. 18, 18 (2015)","journal-title":"Rom. J. Inf. Sci. Technol."},{"key":"4335_CR59","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/BF00193563","volume":"5","author":"UM Maurer","year":"1992","unstructured":"Maurer, U.M.: A universal statistical test for random bit generators. J. Cryptol. 5, 89\u2013105 (1992)","journal-title":"J. Cryptol."},{"key":"4335_CR60","doi-asserted-by":"crossref","DOI":"10.1142\/1107","volume-title":"Random Walk in Random and Non-Random Environments","author":"P Revesz","year":"1990","unstructured":"Revesz, P.: Random Walk in Random and Non-Random Environments. World Scientific, Singapore (1990)"},{"key":"4335_CR61","unstructured":"Marsaglia, G.: Diehard: a battery of tests of randomness (1996). http:\/\/stat.fsu.edu\/pub\/diehard\/. Accessed on: January 5 2021"},{"key":"4335_CR62","unstructured":"Brown, R.G.: Dieharder, 2006. https:\/\/webhome.phy.duke.edu\/ rgb\/General\/dieharder.php. Accessed on January 5 2021"},{"key":"4335_CR63","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/0024-3795(85)90192-2","volume":"67","author":"G Marsaglia","year":"1985","unstructured":"Marsaglia, G., Tsay, L.H.: Matrices and the structure of random number sequences. Linear Algebra Appl. 67, 147\u2013156 (1985)","journal-title":"Linear Algebra Appl."},{"key":"4335_CR64","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1239\/jap\/1014842270","volume":"37","author":"A Rukhin","year":"2000","unstructured":"Rukhin, A.: Approximate entropy for testing randomness. J. Appl. Probab. 37, 88\u2013100 (2000)","journal-title":"J. Appl. Probab."},{"key":"4335_CR65","volume-title":"The Fourier Transform and Its Applications","author":"RN Bracewell","year":"1986","unstructured":"Bracewell, R.N.: The Fourier Transform and Its Applications. McGraw-Hill, New York (1986)"},{"key":"4335_CR66","unstructured":"Killman, W., Sch\u00fcth, J., Thumser, W., Uludag, I.: A note concerning the dft test in nist special publication 800-22. T-Systems, Systems Integration (2004)"},{"key":"4335_CR67","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1119\/1.16503","volume":"58","author":"ND Mermin","year":"1990","unstructured":"Mermin, N.D.: Quantum mysteries revisited. Am. J. Phys. 58, 731 (1990)","journal-title":"Am. J. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04335-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-024-04335-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04335-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T18:15:09Z","timestamp":1714500909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-024-04335-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,28]]},"references-count":67,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["4335"],"URL":"https:\/\/doi.org\/10.1007\/s11128-024-04335-8","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,28]]},"assertion":[{"value":"15 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest is declared.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"132"}}