1. [1] “ETSI/SAGE. specification of the 3GPP confidentiality and integrity algorithms UEA2 & UIA2. Document 2: SNOW3G specification, version 1.1 (September 2006).” https://www.gsma.com/security/wp-content/uploads/2019/05/snow3gspec.pdf/
2. [2] P. Ekdahl and T. Johansson, “A new version of the stream cipher SNOW,” Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, Aug. 2002. Revised Papers, K. Nyberg and H.M. Heys, eds., Lecture Notes in Computer Science, vol.2595, pp.47-61, Springer, 2002. 10.1007/3-540-36492-7_5
3. [3] “Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers.” https://www.iso.org/standard/54532.html/
4. [4] A. Biryukov, D. Priemuth-Schmid, and B. Zhang, “Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G⊕,” Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 2010. Proceedings, pp.139-153, 2010. 10.1007/978-3-642-13708-2_9
5. [5] S. Kiyomoto, T. Tanaka, and K. Sakurai, “K2: A stream cipher algorithm using dynamic feedback control,” SECRYPT 2007, Proc. International Conference on Security and Cryptography, Barcelona, Spain, July 2007, SECRYPT is part of ICETE-Teh International Joint Conference on e-Business and Telecommunications, J. Hernando, E. Fernández-Medina, and M. Malek, eds., pp.204-213, INSTICC Press, 2007. 10.5220/0002122302040213