Zeng K.[J].Yang C H, Rao T R N. An improved linear syndrome algorithm in cryptanalysis with applications. In: Advances in Cryptology- EUROCRYPT90, Berlin, Springer-Verlag.1991,:-[2]Zeng K.[J].Huang H. On the linear syndrome method in cryptanalysis. In: Advances in CryptologyEUROCRYPT88, London, Springer-Verlag.1989,:-Meier W.[J].Staffelbach O. Fast correlation attacks on stream ciphers. In: Advances iii CryptologyEUROCRYPT88, Brelin, Springer-Verlag.1989,:-[3]Zeng K.[J].Yang C H, Rao T R N. On the linear consistency test(LCT) in cryptanalysis with applications. In: Advances in Cryptology-EUROCRYPT89, Barcelona, Springer-Verlag.1990,:-[4]Anderson R J. Searching for the optimum correlation attack. Fast Software EncryptionLeuven94, Lecture Notes in Computer Science, vol.1008, B. Preneel, Springer-Verlag, 1995:137-143[5]Golic J Dj. On the security of nonlinear filter generators. Fast Software Encryption-Cambridge96,Lecture Notes in Computer Science, vo1.1039, D. Gollmanned, Springer-Verlag, 1996: 173-188.[6]Chepyzhov V.[J].Johansson T, Smeets B. A simple algorithm for fast correlation attacks on stream ciphers. Fast Software Encryption, FSE2000, Lecture Notes in Computer Science, SpringerVerlag.2000,:-[7]Athreya K B, Ney P E. Branching Processes. Berlin: Springer-Verlag, 1972.
|