Lenstra et al . note that this problem can be minimized by using a strong random seed of bit-length twice the intended security level, or by employing a deterministic function to choose " q " given " p ", instead of choosing " p " and " q " independently.