1. A. Yu. Storozhuk, Evaluation and Provability Methods of the Stream Ciphers’ Security against Statistical Attacks Based on Algebraic Degenerate Approximations of Boolean Functions [in Ukrainian], Ph.D. Thesis, National Aviation University, Kyiv (2016).
2. I. Gorbenko, A. Kuznetsov, Yu. Gorbenko, A. Alekseychuk, and V. Timchenko, “Strumok keystream generator,” in: 2018 IEEE 9th Intern. Conf. on Dependable Systems, Services and Technologies (DESSERT) (Kyiv, Ukraine, May 24–27, 2018), IEEE (2018), pp. 294–299. https://doi.org/10.1109/DESSERT.2018.8409147.
3. The National Standard of Ukraine “DSTU 8845:2019, Information technologies, Cryptographic data security, Symmetric block transformation algorithm,” DP “UkrNDNTs,” Kyiv (2019).
4. M. Hell, T. Johansson, A. Maximov, and W. Meier, “The Grain family of stream ciphers,” in: M. Robshaw and O. Billet (eds.), New Stream Cipher Designs; Lecture Notes in Computer Science, Vol. 4986, Springer, Berlin–Heidelberg (2008), pp. 179–190. https://doi.org/10.1007/978-3-540-68351-3_14.
5. E. Dubrova and M. Hell, “Espresso: A stream cipher for 5G wireless communication systems,” Cryptology ePrint Archive: Report 2015/241 (2015). URL: http://eprint.iacr.org/2015/241.