1. Armknecht, F.: A Linearization Attack on the Bluetooth Key Stream Generator, December 13 (2002), Available on http://eprint.iacr.org/2002/191/
2. Lecture Notes in Computer Science;F. Armknecht,2003
3. Lecture Notes in Computer Science;R. Anderson,1994
4. Babbage, S.: Cryptanalysis of LILI-128, Nessie project internal report, January 22 (2001), https://www.cosic.esat.kuleuven.ac.be/nessie/reports/
5. Blahut, R.E.: Theory and Practice of Error Control Codes. Addison-Wesley, Reading (1983)