1. 3rd Generation Partnership Project (2005) Specification of the 3GPP confidentiality and integrity algorithms - document 2: KASUMI specification (release 6). Tech. Rep. 3GPP TS 35.202 V6.1.0 (2005-09)
2. Armknecht F, Meier W (2006) Fault attacks on combiners with memory. Springer, Berlin, pp 36–50
3. Aumasson JP, Dinur I, Meier W, Shamir A (2009) Fast software encryption: 16th international workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 revised selected papers, chap. Cube testers and key recovery attacks on reduced-round MD6 and trivium. Springer, Berlin
4. Biham E, Shamir A (1991) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4(1):3–72
5. Billet O, Gilbert H (2005) Topics in cryptology – CT-RSA 2005: the cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings, chap. Resistance of SNOW 2.0 against algebraic attacks. Springer, Berlin, pp 19–28