1. Handbook of applied cryptography;Menezes,1997
2. The vulnerability of geometric sequences based on fields of odd characteristic;Klapper;Journal of Cryptology,1994
3. On the linear span of binary sequences obtained from finite geometries. Advances in Cryptology: Proceedings of the 4th Annual International Cryptology Conference (Crypto’'86), Aug 11–15, 1986, Santa Barbara, CA, USA. LNCS 263;Chan,1987
4. On the generation of cryptographically strong pseudorandom sequences;Shamir;ACM Transactions on Computer Systems,1983
5. A simple unpredictable pseudo-random number generator;Blum;SIAM Journal on Computing,1986