1. J. Abbott, A.M. Bigatti, L. Robbiano, CoCoA: a system for doing computations in commutative algebra. Available at http://cocoa.dima.unige.it
2. Heuristic guess-and-determine attacks on stream ciphers
3. Fault Attacks on Combiners with Memory
4. S. Babbage, C. De Cannière, A. Canteaut, C. Cid, H. Gilbert, T. Johannson, M. Parker, B. Preneel, V. Rijmen, and M. Robshaw, The eSTREAM portfolio (rev. 1), preprint (2008). Available at http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf
5. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures