1. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
2. Venona, L.L.: The Most Secret Operation of the US Intelligence Agencies. Olma-Press, Moscow (2003)
3. Lano J.: Cryptanalysis and design of synchronous stream ciphers.
www.esat.kuleuven.be/cosic/publications/thesis-124.pdf
. Accessed 25 Dec 2016
4. Wu, H.: Cryptanalysis and design of stream ciphers.
www.pdfs.semanticscholar.org/7659/3b22460d3c070ed1c900f75771c9165cccb2.pdf
. Accessed 14 Oct 2016
5. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge-based pseudo-random number generators.
www.keccak.team/files/SpongePRNG.pdf
. Accessed 25 Dec 2017