BLASER W, HEINZMANN P. New Cryptographic Device with High Security Using Public Key Distribution [C]//Proceedings of the IEEE Student Papers Contest 1979-1980.Heidelberg:Springer, 1980: 145-150.
[2]
SIEGENTHALER T. Decrypting a Class of Stream Ciphers Using Ciphertext only[J]. IEEE Transactions on Computers, 1985,34(1):81-85.
[3]
SIEGENTHALER T. Correlation-immunity of Nonlinear Combining Functions for Cryptographic Applications[J]. IEEE Transactions Information Theory, 1984,30(5):776-780.
[4]
XIAO G Z, MASSEY J L. Spectral Characterization of Correlation-immune Combining Functions[J]. IEEE Transactions on Information Theory, 1988,34(3):569-571.
[5]
冯登国. 频谱理论及其在密码学中的应用[M]. 北京: 科学出版社, 2000.
[6]
WU C K, FENG D G. Boolean Functions and Their Applications in Cryptography.Advances in Computer Science and Technology[M]. Heidelberg:Springer-Verlay, 2016: 1-256.
[7]
DING C S, SHAN W J, XIAO G Z. The Stability Theory of Stream Ciphers[M]. Heidelberg:Springer-Verlay, 1991.