1. ECRYPT, ECRYPT yearly report on algorithms and keysizes (2004). Version 1.1 (March 2005), Available from
http://www.ecrypt.eu.org
2. ECRYPT, eSTREAM - the ECRYPT Stream Cipher Project. Information available from
http://www.ecrypt.eu.org/stream/
3. Babbage, S.H.: Improved exhaustive search attacks on stream ciphers. In: European Convention on Security and Detection, IEE Conference publication, vol. 408, pp. 161–166. IEE (1995)
4. Babbage, S., Dodd, M.: The stream cipher MICKEY (version 1). ECRYPT Stream Cipher Project Report 2005/015 (2005), Available from [2]
5. Lecture Notes in Computer Science;A. Biryukov,2000