1. Berlekamp, E.R.: Algebraic Coding Theory, Ch. 7. McGraw-Hill, New York (1968)
2. Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Advances in Cryptology-Asiacrypt’00. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
3. Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback shift registers. In: Advances in Cryptology-Eurocrypt’03. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
4. Dillon, J., Dobbertin, H.: New cyclic difference sets with singer parameters. Finite Fields Appl. 10(3), 342–389 (2004)
5. Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Advances in Cryptology-EUROCRYPT ’09. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)