1. Babbage, S., Dodd, M.: The MICKEY stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 191–209. Springer, Berlin, Heidelberg (2008).
https://doi.org/10.1007/978-3-540-68351-3_15
2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponge functions (2011).
https://keccak.team/sponge_duplex.html
3. Beth, T., Piper, F.C.: The Stop-and-go generator. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) Advances in Cryptology, Proceedings of EUROCRYPT’84. Lecture Notes in Computer Science, vol. 209, pp. 88–92. Springer, Berlin, Heidelberg (1985).
https://doi.org/10.1007/3-540-39757-4_9
4. Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Goos, G., Hartmanis, J., Van Leeuwen, Schneier, B. (eds.) Proceedings of Fast Software Encryption 2000. Lecture Notes in Computer Science, vol. 1978, pp. 1–18. Springer, Berlin, Heidelberg (2001).
https://doi.org/10.1007/3-540-44706-7_1
5. Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of A5/1 (1999).
http://www.scard.org/gsm/a51.html