1. Lecture Notes in Computer Science;F. Armknecht,2006
2. Gwenolé, A., Jean-Charles, F.: An Algebraic Cryptanalysis of Nonlinear Filter Generators using Gröbner Bases, INRIA research report,
https://hal.ccsd.cnrs.fr/
3. Babbage, S.: A Space/Time Tradeoff in Exhaustive Search Attacks on Stream Ciphers European Convention on Security and Detection. In: IEE Conference Publication No. 408 (1995)
4. Bardet, M., Faugère, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proc. International Conference on Polynomial System Solving ICPSS, Paris,France, pp. 71–75
5. Lecture Notes in Computer Science;O. Billet,2005