[1] Coppersmith D, Krawczyk H, Mansour Y. The Shrinking Generator[C]//Advanced in Cryptology-CRYPT'93: LNCS 765. Berlin: Springer-Verlag, 1994: 22-39.
[2] Meier W, Staffelbach O. The Self-Shrinking Generator [C]//Advanced in Cryptology-Eurocrypt'94: LNCS 905. Berlin: Springer-Verlag, 1994: 205-214.
[3] Kanso A. Modified Self-shrinking Generator[J]. Computers & Electrical Engineering, 2010, 36(5): 993-1001.
[4] Hu Yupu, Xiao Guozhen. The Generalized Self-shrinking Generator[J]. IEEE Trans on Information Theory, 2004, 50(4): 714-719.
[5] Fuster-Sabater A, Caballero-Gil P. Analysis of the Generalized Self-shrinking Generator[J]. Computers & Mathematics with Applications, 2011, 61(4): 871-880.
[6] Zhang Bin, Wu Hongjun, Feng Dengguo, et al. Security Analysis of the Generalized Self-shrinking Generator[C]//ICICS'04: LNCS 3269. Berlin: Springer-Verlag, 2004: 388-400.
[7] Hell M, Johansson T, Brynielsson L. An Overview of Distinguishing Attacks on Stream Ciphers[J]. Cryptography and Communications, 2009, 1(1): 71-94.
[8] Meier W, Staffelbach O. Fast Correlation Attacks on Stream Ciphers[C]//Advanced in Cryptology-Eurocrypt'88: LNCS330. Berlin: Springer-Verlag, 1994: 310-314.
[9] Du Yusong, Pei Dingyi. Construction of Boolean Functions with Maximum Algebraic Immunity and Count of Their Annihilators at Lowest Degree[J]. Science China: Information Sciences, 2010, 53(4): 780-787.
[10] 刘福运, 肖鸿, 肖国镇. 一种代数正规形快速变换的零化子算法[J]. 西安电子科技大学学报, 2009, 36(5): 890-895.
Liu Fuyun, Xiao Hong, Xiao Guozhen. Research on Finding Annihilators of Boolean Functions Based the Algebraic Normal Form Fast Transformations[J]. Journal of Xidian University, 2009, 36(5): 890-895.
[11] Hell M, Johansson T. Some Attacks on the Bit-Search Generator[C]//Fast Software Encryption, 12th International Workshop, FSE 2005: LNCS 3557. Berlin: Springer-Verlag, 2005: 215-227.
[12] McEliece R J. Finite Field for Computer Scientists and Engineers[M]. Massachusetts: Kluwer Academic Publishers, 1987.
[13] Golic' J D. Computation of Low-Weight Parity Check Polynomials[J]. Electronic Letters, 1996, 32(21): 1981-1982. |