References
- Henry J. Beker and Fred C. Piper, 'Cipher systems : The Protection of Communications,' Northwood Books, London, 1982
- Henk C. A. van Tilborg, 'An Introduction to Cryptology,' KLUWER ACADEMIC PUBLISHERS, Boston, etc., 1988
- T. Siegenthaler, 'Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications,' IEEE Trans. on Infor. Theo., Vol.IT-30, No.5, pp.776-780, Sep. 1984
- J. Dj. Galic, 'The Number of Output Sequences of a Binary Sequence Generator,' LNCS 547, Advances in Cryptology-EUROCRYPT'91, pp.160-167, 1991
- 이훈재, 문상재, '다수열 출력 이진 수열 발생기', 한국통신정보보호학회 논문지, 제7권 제3호, pp.11-22, 1997
- E. Dawson, L. Nielsen, 'Automated Cryptanalysis of XOR Plaintext Strings,' Cryptologia, Vol.XX, No.2, pp.165-181, Apr. 1996 https://doi.org/10.1080/0161-119691884870
- Philip R. Geffe, 'How to Protect Data with Ciphers that are really hard to Break,' Electronics, pp.99-101, Jan. 1973
- 최회동, 노종선, 'PN 시퀸스를 이용한 S-box 설계에 관한 연구', 한국통신학회 논문지, 제20권 제2호, pp.319-326, 1995
- R. A. Rueppel and O. J. Stafflebach, 'Products of Linear Recurring Sequences with Maximum Com plexity,' IEEE Trans. on Infor. Thea., Vol.IT-33, No.1, pp.124-131, Jan. 1987 https://doi.org/10.1109/TIT.1987.1057268
- J. Dj. Golic, 'On the Linear Complexity of Functions of Periodic GF(q) Sequences,' IEEE Trans. on Infor. Thea., Vol.IT-35, No.1, pp.69-75, Jan. 1989 https://doi.org/10.1109/18.42178
- B. Park, H. Choi, T. Chang and K. Kang, 'Period of Sequences of Primitive Polynomials,' Electronics Letters, Vol.29, No.4, pp.390-391, Feb, 1993