1. ETSI/SAGE Specification: Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. Document 4: Design and Evaluation Report, Version: 2.0. Technicl Report, ETSI 2011. http://www.gsmworld.com/our-work/programmes-and-initiatives/fraud-and-security/gsm_security_algorithms.htm (2011). Accessed 9 Sept 2011.
2. Zhu X.Y., Qi W.F.: On the distinctness of modular reduction of maximal length modulo odd prime numbers. Math. Comput. 77(7), 1623–1637 (2008).
3. Zheng Q.X., Qi W.F., Tian T.: On the distinctness of modular reduction of primitive sequences over $${ Z}/(2^{32}-1)$$ Z / ( 2 32 - 1 ) . Des. Codes Cryptogr. 112(22), 872–875 (2012). doi: 10.1007/s10623-012-9698-y .
4. Lidl R., Niedereiter H.: Finite Field. Addison-Wesley, Don Mills (1983).
5. Hall M.: An isomorphism between linear recurring sequences and algebraic rings. Trans. Am. Math. Soc. 44, 196–218 (1938).