1. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press LCC, Boca Raton (1996)
2. Dalai, D.K., Gupta, K.C., Maitra, S.: Results on algebraic immunity for cryptographically significant boolean functions. In: The Proceedings of Progress in Cryptology, INDOCRYPT 2004, vol. 3348, pp 92–106. Springer, LNCS (2004)
3. Ekdhal, P: On LFSR based stream ciphers analysis and design, Ph.D. Thesis, Department of Information Technology, Lund University (2003)
4. Frederik, Armknecht: Matthias, Krause: Constructing Single and Multi-output Boolean Functions with Maximal Algebraic Immunity, In: The Proceedings of ICALP 2006, Venice,Italy vol. 4052. Springer, LNCS (2006)
5. Golic, J.: Edit distances and probabilities for correlation attacks on clock controlled combiners with memory. In: ACISP 96, Wollongong, Australia. IEEE Trans. Inf. Theory 47(3), (2001)