1. Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of A5/1. (1999), Available at, http://jya.com/a51-pi.htm (accessed August 18, 2003)
2. Lecture Notes in Computer Science;A. Canteaut,2000
3. Lecture Notes in Computer Science;V. Chepyzhov,1991
4. Dodd, M.W.: Applications of the Discrete Fourier Transform in Information Theory and Cryptology. PhD thesis, University of London (2003)
5. ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932. (2005), Available at, http://www.ecrypt.eu.org/stream/ (accessed September 29, 2005)