References
- B. Schneier, Applied Cryptography, 2nd Ed., John Wiley & Sons, Inc., 1996
- A. Menezes, et al. Handbook of Applied Cryptography(2nd edition), CRC press, 1997
- Hoonjae Lee, Sangjae Moon, 'Parallel Stream Cipher for Secure High-Speed Communications,' Signal Processing, Vol. 82, No. 2, pp. 259-265, Feb., 2002 https://doi.org/10.1016/S0165-1684(01)00180-3
- R. A. Rueppel, 'Correlation Immunity and the Summation Generator,' Advances in Cryptology, Proceedings of CRYPTO'85, pp. 260-272, 1985
- Hoonjae Lee, Sangjae Moon, 'On An Improved Summation Generator with 2-Bit Memory,' Signal Processing, Vol. 80, No. 1, pp. 211-217, Jan., 2000 https://doi.org/10.1016/S0165-1684(99)00123-1
- B. Park, H. Choi, T. Chang and K. Kang, 'Period of Sequences of Primitive Polynomials,' Electronics Letters, Vol. 29, No. 4, pp. 390-391, Feb., 1993 https://doi.org/10.1049/el:19930262
- D. Watanabe, S. Furuya, H. Yoshida and B. Preneel, 'A new keystream generator MUGI,' Proceedings of Fast Software Encryption 2002, FSE'02, LNCS, Springer-Verlag, 2002
- G. Rose, 'A stream cipher based on linear feedback over GF(2^8),' Proceedings of ACISP'98, LNCS, Vol. 1438, Springer-Verlag, 1998 https://doi.org/10.1007/BFb0053728
- D. A. McGrew and S. R. Fluhrer, 'The Stream Ciher LEVIATHAN,' Submitted to the NESSIE process, 2001
- J. Hastad and M. Naslund, 'BMGL : Synchronous Key-stream generator with provabel Security,' submitted to the NESSIE process, 2000
- P. Ekdahl and T. Johansson, 'SNOW-a new stream cipher,' Submitted to the NESSIE process, 2000
- E. Dawson, A. Clark, J. Golic, W. Millan, L. Penna, L. Simpson, 'The LILI-128 Keystream Generator,' 1st NESSIE Workshop, Nov., 2000
- A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W. Millan, Sang-Jae Moon, L. Simpson, 'The LILI-II Keystream Generator,' LNCS 2384, ACISP'2002, pp. 25-39, Jul., 2002 https://doi.org/10.1007/3-540-45450-0_3
- NESSIE site in https://www.cosic.esat.kuleuven.ac.be/nessie/