1. Bluetooth SIG, Specification of the Bluetooth system, Version 1.1, 1 February 22 (2001), available at http://www.bluetooth.com/
2. Courtois, N.: Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 182–199. Springer, Heidelberg (2003), An updated version is available at http://eprint.iacr.org/2002/087
3. Lecture Notes in Computer Science;N. Courtois,2003
4. Courtois, N.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, these proceedings
5. N. Courtois, J. Pieprzyk;N. Courtois,2002