1. Baignères T., Junod P., Vaudenay S.: How far can we go beyond linear cryptanalysis?. In: Advances in Cryptology—ASIACRYPT 2004. Lecture Notes in Computer Science, vol. 3329, pp. 432–450. Springer, Berlin (2004).
2. Cover T., Thomas J.A.: Elements of Information Theory. Wiley Series in Telecommunication. Wiley, New York (1991)
3. Dunkelman O.: Phorum5: ECRYPT Forum, Post ‘A Small Observation on HC-128’. http://www.ecrypt.eu.org/stream/phorum/read.php?1,1143 . Last accessed 3 July 2011.
4. ECRYPT: D.SYM.3—The eSTREAM Portfolio 2009 Annual Update, ICT-2007-216676. http://www.ecrypt.eu.org/stream/D.SYM.3-v1.1.pdf . Last accessed 14 Jan 2011.
5. ECRYPT: eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932. http://www.ecrypt.eu.org/stream/ . Last accessed 14 Jan 2011.