J. Acharya, A. Orlitsky, A. T. Suresh, and H. Tyagi. "The Complexity of Estimating Rényi Entropy". In: SODA 2015. 2015, pp. 1855-1869.
E. Arikan. "An inequality on guessing and its application to sequential decoding". In: IEEE Trans. Information Theory 42. 1 (1996), pp. 99-105.
D. Bajovíc, J. Xavier, and B. Sinopoli. "Products of stochastic matrices: large deviation rate for Markov chain temporal dependencies". In: Annual Allerton Conference on Communication, Control, and Computing. 2012, pp. 724-729.
E. Barker and J. Kelsey. "Recommendation for the entropy sources used for random bit generation". In: Draft NIST Special Publication (2012), pp. 800-900.
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer. "Generalized privacy amplification". In: IEEE Trans. Information Theory 41. 6 (1995), pp. 1915-1923.
D. J. Bernstein, J. Breitner, D. Genkin, L. G. Bruinderink, N. Heninger, T. Lange, C. van Vredendaal, and Y. Yarom. "Sliding right into disaster: Left-to-right sliding windows leak". In: CHES. Springer. 2017, pp. 555-576.
I. Csiszár. "Generalized cutoff rates and Renyi's information measures". In: IEEE Trans. Information Theory 41. 1 (1995), pp. 26-34.
M. K. Hanawal and R. Sundaresan. "Guessing Revisited: A Large Deviations Approach". In: IEEE Trans. Information Theory 57. 1 (2011), pp. 70-78.
P. E. Hart. "Moment Distributions in Economics: An Exposition". In: Journal of the Royal Statistical Society. Series A (General) 138. 3 (1975), pp. 423-434.
N. Heninger and H. Shacham. "Reconstructing RSA Private Keys from Random Key Bits". In: CRYPTO 2009. Springer, 2009, pp. 1-17.
R. Impagliazzo and D. Zuckerman. "How to recycle random bits". In: 30th Annual Symposium on Foundations of Computer Science. IEEE. 1989, pp. 248-253.
P. Jacquet, G. Seroussi, and W. Szpankowski. "On the entropy of a hidden Markov process". In: Theor. Comput. Sci. 395. 2-3 (2008), pp. 203-219.
R. Jenssen, K. E. Hild, D. Erdogmus, J. C. Principe, and T. Eltoft. "Clustering using Renyi's entropy". In: International Joint Conference on Neural Networks. Vol. 1. 2003, 523-528 vol. 1.
P. Jizba, H. Kleinert, and M. Shefaat. "Rényi's information transfer between financial time series". In: Physica A: Statistical Mechanics and its Applications 391. 10 (2012), pp. 2971-2989.
S. Kamath and S. Verdú. "Estimation of entropy rate and Rényi entropy rate for Markov chains". In: ISIT. 2016, pp. 685-689.
D. E. Knuth. The Art of Computer Programming: Sorting and Searching. Redwood City, CA, USA: Addison Wesley Longman Publishing Co., Inc., 1998.
K. Li, W. Zhou, S. Yu, and B. Dai. "Effective DDoS attacks detection using generalized entropy metric". In: International Conference on Algorithms and Architectures for Parallel Processing. Springer. 2009, pp. 266-280.
J. Luo and D. Guo. "On the Entropy Rate of Hidden Markov Processes Observed Through Arbitrary Memoryless Channels". In: IEEE Trans. Information Theory 55. 4 (2009), pp. 1460-1467.
B. Ma, A. Hero, J. Gorman, and O. Michel. "Image registration with minimum spanning tree algorithm". In: International Conference on Image Processing. Vol. 1. 2000, pp. 481-484.
C. R. MacCluer. "The Many Proofs and Applications of Perron's Theorem. " In: SIAM Review 42. 3 (2000), pp. 487-498.
Y. Mansour, M. Mohri, and A. Rostamizadeh. "Multiple source adaptation and the Rényi divergence". In: Conference on Uncertainty in Artificial Intelligence. 2009, pp. 367-374.
M. Marcus and M. Newman. "The sum of the elements of the powers of a matrix. " In: Pacific J. Math. 12. 2 (1962), pp. 627-635.
H. Neemuchwala, A. O. H. III, S. Zabuawala, and P. L. Carson. "Image registration methods in high-dimensional space". In: Int. J. Imaging Systems and Technology 16. 5 (2006), pp. 130-145.
L. Paninski. "Estimation of Entropy and Mutual Information". In: Neural Comput. 15. 6 (June 2003), pp. 1191-1253.
C. E. Pfister and W. G. Sullivan. "Rényi Entropy, Guesswork Moments, and Large Deviations". In: IEEE Trans. Information Theory 50. 11 (2004), pp. 2794-2800.
Z. Rached, F. Alajaji, and L. L. Campbell. "Rényi's divergence and entropy rates for finite alphabet Markov sources". In: IEEE Trans. Information Theory 47. 4 (2001), pp. 1553-1561.
R. Renner and S. Wolf. "Smooth Renyi entropy and applications". In: International Symposium onInformation Theory. June 2004, pp. 233-.
A. Rényi. "On measures of information and entropy". In: Berkeley Symposium on Mathematics, Statistics and Probability. 1960, pp. 547-561.
P. K. Sahoo and G. Arora. "A thresholding method based on two-dimensional Renyi's entropy". In: Pattern Recognition 37. 6 (2004), pp. 1149-1161.
P. C. van Oorschot and M. J. Wiener. "Parallel Collision Search with Cryptanalytic Applications". In: J. Cryptology 12. 1 (1999), pp. 1-28.
C. Wu, E. L. Xu, and G. Han. "Renyi entropy rate of hidden Markov processes". In: IEEE International Symposium on Information Theory (ISIT). 2017, pp. 2970-2974.
D. Xu. "Energy, Entropy and Information Potential for Neural Computation". AAI9935317. PhD thesis. Gainesville, FL, USA, 1998.