1. Lect Notes Comput Sci;R. Anderson,1994
2. Frederik Armknecht: A Linearization Attack on the Bluetooth Key Stream Generator, Available on http://eprint.iacr.org/2002/191/ . 13 December 2002
3. Steve Babbage: Cryptanalysis of LILI-128, Nessie project internal report, available at https://www.cosic.esat.kuleuven.ac.be/nessie/reports/ , 22 January 2001.
4. Lect Notes Comput Sci;E. Biham,1997
5. Lect Notes Comput Sci;P. Camion,1992