References

A NEW APPROACH TO COMBINE LFSRS:


[1] R. Elwyn Berlekamp, Algebraic Coding Theory, McGraw-Hill, New York, 1968.

[2] Nicolas Courtois, Fast algebraic attacks on stream ciphers with linear feedback, CRYPTO (2003), 176-194.

[3] Itai Dinur and Adi Shamir, Cube Attacks on Tweakable Black Box Polynomials, IACR Cryptology ePrint Archive, 2008:385, 2008.

[4] C. G. Günther, Alternating Step Generators Controlled by de Bruijn Sequences, In Proceedings of the 6th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT\\\\\\\'87, pages 5-14, Berlin, Heidelberg, Springer-Verlag, 1988.

[5] R. Lidl and H. Niederreiter, Finite Fields Encyclopedia of Mathematics and its Applications, Addison-Wesley Publ. Co., Advanced Book Program/World Science Division, 1983.

[6] James L. Massey, Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory 15 (1969), 122-127.

[7] Willi Meier and Othmar Staffelbach, Fast Correlation Attacks on Stream Ciphers (extended abstract), In C. G. Günther, editor, EUROCRYPT, Volume 330 of Lecture Notes in Computer Science, pages 301-314, Springer, 1988.

[8] H. Niederreiter, The multiple-recursive matrix method for pseudo random number generation, Finite Fields and their Applications 1 (1995), 3-30.

[9] NIST, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, http://csrc.nist.gov/groups/ST/toolkit/rng/document ation_software.html, 2010.

[10] Rainer A. Rueppel, Correlation Immunity and the Summation Generator, In Hugh C. Williams, editor, CRYPTO, Volume 218 of Lecture Notes in Computer Science, pages 260-272, Springer, 1985.

[11] Thomas Siegenthaler, Cryptanalysts Representation of Nonlinearly Filtered ml-sequences, In Franz Pichler, editor, EUROCRYPT, Volume 219 of Lecture Notes in Computer Science, pages 103-110, Springer, 1985.

[12] Thomas Siegenthaler, Decrypting a class of stream ciphers using ciphertext only, IEEE Trans. Computers 34(1) (1985), 81-85.