1. Cryptrec, http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html
2. Nessie : New european schemes for signatures, integrity, and encryption, https://www.cryptonessie.org
3. Nessie security report. Technical Report V2.0 (February 2003)
4. Vanstone, S., Menezes, A., Oorschot, P.: Handbook of Applied Cryptograph 5th edn. CRC Press, Boca Raton (1996)
5. Armknecht,F.: A linearization attack on the bluetooth key stream generator. Cryptology ePrint Archive, Report 2002/191, (2002), http://eprint.iacr.org/