1. Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman,The Design and Analysis of Computer Algorithms, Computer Science and Information Processing, Addison-Wesley Publishing Company (1975).
2. C. H. Bennett, G. Brassard, and J. M. Robert, Privacy amplification by public discussion,SIAM J. Computing, Vol. 17 (1988) pp. 210?229.
3. P. Camion, C. Carlet, P. Charpin, and N. Sendrier, On correlation-immune functions, Lecture Notes in Computer Science, Vol. 576 (1992) pp. 86?100.
4. Benny Chor, Oded Goldreich, Johan Håstad, Joel Friedman, Steven Rudich, and Roman Smolensky, The bit extraction problem ort-resilient functions,26th IEEE Symposium on Foundations of Computcr Science (1985) pp. 396?407.
5. P. Delsarte, An algebraic approach to the association schemes of coding theory,Philips Research Reports Supplements, Vol. 10 (1973). Thesis, Universite Catholique de Louvain.