1. Gollmann D (1994) Cryptanalysis of clock-controlled shift registers. Fast software encryption. Lecture notes in computer science, vol 809. Springer, Berlin, pp 121–126
2. Lecture notes in computer science;J Golic,1995
3. Lecture notes in computer science;J Golic,1995
4. Al Jabri KA (1996) Shrinking generators and statistical leakage. Comput Math Appl 32(4):33–39, Elsevier Science
5. Johansson T (1998) Reduced complexity correlation attacks on two clock-controlled generators. Advances in cryptology Asiacrypt’98. Lecture notes in computer science, vol 1514. Springer, Berlin, pp 342–356