6Courtois N, Meier W. Algebraic Attacks on Stream Ciphers with Linear Feedback[C]//Advances in Cryptology- Eurocrypt 2003, LNCS 2656. Berlin: Springer-Verlag, 2003: 345-359.
7Li N, Qi W F. Symmetric Boolean Function with Maximum Algebraic Immunity Depending on an Odd Number of Variables [J]. IEEE Trans on Information Theory, 2006, 52(5): 2271-2273.
8Li N, Qu L J, Qi W F. On the Construction of Boolean Functions with Optimal Algebraic Immunity[J]. IEEE Trans on Information Theory, 2008, 54(3): 1330-1334.
9Braeken A, Preneel B. On the Algebraic Immunity of Symmetric Boolean Functions[C]//Proc Indocrypt 2005, LNCS 3797. Berlin: Springer-Verlag, 2005: 35-48.
10Armknecht F, Krause M. Algebraic Attacks on Combiners with Memory[C3//Advances in Cryptography-Crypto 2003, LNCS 2729. Berlin: Springer-Verlag, 2003: 162-175.