1. H. Beker and F. Piper,Cipher Systems, Northwood Books, London, 1982.
2. A. M. Frieze, J. Hastad, R. kannan, J. C. Lagarias, and A. Shamir, Reconstructing Truncated Integer Variables Satisfying Linear Congruences,SIAM J. Comput.,17, 262–280 (1988).
3. M. Q. Huang, Analysis and Cryptology Evaluation on Primitive Sequences, Ph.D. Dissertation, Department of Mathematics, Graduate School, Academia Sinica, Beijing, 1988.
4. R. Lidl and H. Niederreiter,Finite Fields, Encyclopaedia of Mathematics and Its Applications, Vol. 20, Addison-Wesley, Reading, MA, 1983.
5. R. A. Rueppel,Analysis and Design of Stream Ciphers, Springer-Verlag, Berlin, 1986.