1Shamir,Courtois,Patarin,Klimov.Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations[].Advances in Cryptology-EUROCRYPT.2000
2Courtois,Meier.Algebraic Attacks on Stream Ciphers with Linear Feedback[].Advances in Cryptology-Eurocrypt.2003
3Armknecht,Krause.Algebraic attacks on combiners with memory[].Advances in Cryptology-Crypto.2003
4NICOLAS Courtois.Algebraic attacks on com biners with m em ory and severaloutputs[C/OL]. http:∥eprint.iacr.org/2003/125.pdf .
5Fermi E, Pasta J and Ulam S 1955 Los Alamos Report LA-1940 977.
6Hu X G and Tang Y 2008 Chin. Phys. B 17 426805.
7Hou Q W and Cao B Y 2012 Chin. Phys. B 21 014401.
8Giardina C and Livi R 1998 J. Stat. Phys. 91 1027.