How to generate cryptographically strong sequences of pseudo random bits | IEEE Conference Publication | IEEE Xplore