Return to Article Details Theoretical justification and practical implementation of entropy extractors based on national cryptographic algorithms Download Download PDF