E. Titlebaum, IEEE Trans. on AES, AES-17(1981)4, 490-493.[2]E. Titlebaum et al., IEEE Trans. on AES, AES-17(1981)4, 494-499.[3]E. Titlebaum et al., IEEE Trans. on AES, AES-27(1991)1, 18-29.[4]J. Bellegarda et al., IEEE Trans. on AES, AES-24(1988)6, 726-742.[5]J. Bellcgarda et al., IEEE Trans. on AES, AE4 27(1991)1, 167-172.[6]S. Maric et al., IEEE Trans. on AES, AES-26(1990)6, 1035-1039.[7]S. Golomb et al., Proc. IEEE, 72(1984)9, 1143-1163.[8]D. Drumheller et al., IEEE Trans. on AES, AES 27(1991)1, 2-10.[9]杨义先,电子科学学刊,13(1991)4,351-357.[10]R. Mersereau et al., IEEE Trans. on AES, AES17(1981)4, 571-578.[11]R Lidl et al.,Finite Fields, Addison-Wesley Publishing Company,[12](1983).
|