1. Biryukov, A.: The design of a stream cipher LEX. Selected Areas in Cryptography—SAC, 2006. Preproceedings (2006)
2. Cid, C., Gilbert, H., Johansson, T.: Cryptanalysis of Pomaranch. IEE Proceedings - Information Security 153(2), 51–53 (2006)
3. Englund, H., Hell, M., Johansson, T.: A note on distinguishing attacks. In: The State of the Art of Stream Ciphers, Workshop Record, SASC 2007, Bochum, Germany (January 2007)
4. Lecture Notes in Computer Science;K. Gjøsteen,2005
5. Hasanzadeh, M., Khazaei, S., Kholosha, A.: On IV setup of Pomaranch. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/082 (2005),
http://www.ecrypt.eu.org/stream