1. Discrete Mathematics and Theoretical Computer Science;C. Carlet,2000
2. Meier, W., Stafelbach, O.: Fast correlation attacks on certain stream ciphers. J. Cryptol. 1(3), 159–176 (1989)
3. Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering Codes. Elsevier, Amsterdam (1997)
4. Millan, W.L.: Analysis and design of Boolean functions for cryptographic applications. Ph.D. thesis, Queensland University of Technology (1997)
5. Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)