1. L.R. Simpson, E. Dawson, J. Golic, and W. Millan, “LILI keystream generator,” Proceedings of SAC 2000, Lecture Notes in Computer Science, vol. 2012, pp. 248-261, 2001
2. C.G. Gunther, “Alternating step generators controlled by De Bruijn sequences”, Proceedings of EUROCRYPT 1987, Lecture Notes in Computer Science, vol. 304, pp. 31-34, 1988
3. D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan, and B. Schneier, “Cryptanalysis of ORYX”, Proceedings SAC’98, Lecture Notes in Computer Science, vol. 1556, pp. 296-305, 1999
4. A. Biryukov, A. Shamir, and D. Wagner, “Real time cryptanalysis of A5/1 on a PC”, Proceedings of FSE 2000, Lecture Notes in Computer Science, vol. 1978, pp. 1-18, 2001
5. K. Kim, S. Lee, S. Park, and D. Lee, “Securing DES S-boxes against three robust cryptanalysis”, Proceedings of the Workshop on Selected Areas in Cryptography, pp. 145-157, 1995