1. Ågren M., Hell M., Johansson T., Meier W.: Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mobile Comput. 5(1), 48–59 (2011).
2. Ågren M., Löndahl C., Hell M., Johansson T.: A survey on fast correlation attacks. Cryptogr. Commun. 4(3), 173–202 (2012).
3. Anderson R.: Searching for the optimum correlation attack. In: Preneel B. (ed.) Fast Software Encryption, vol. 1008, pp. 137–143. Lecture Notes in Computer Science. Springer, Berlin (1995).
4. Billingsley P.: Probability and Measure, 3rd edn. Wiley Series in Probability and Statistics. Wiley, New York (1995).
5. Biryukov A., Shamir A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto T. (ed.) Advances in Cryptology—ASIACRYPT 2000, vol. 1976, pp. 1–13. Lecture Notes in Computer Science. Springer, Berlin (2000).