1[1]Berlekamp, E. R., Algebraic Coding Theory, New York: McGraw-Hill, 1968.
2[2]Massey, J. L., Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, Jan.1969, 15(1): 122-127.
3[3]Ding, C., Xiao, G, Shan, W., The Stability Theory of Stream Ciphers, Berlin: Springer-Verlag, 1991.
4[4]Meier, W., Stafflebach, O., The self-shrinking generator, Advances in Cryptology-EUROCRYPT'94, Berlin:Springer-Verlag, 1995, 205-214.
5[5]Blackburn, S. R., The linear complexity of the self-shrinking generator, IEEE Trans. Inform. Theory, 1999,IT-45(6): 2073-2077.
6[6]Mihaljevic, M. J., A faster cryptanalysis of the self-shrinking generator, Information Security and Privacy-ACISP'96, LNCS 1172, Berlin: Springer-Verlag, 1996, 181 -189.
7[7]Zenner, E., Krause, M., Lucks, S., Improved cryptanalysis of the self-shrinking generator, Information Security and Privacy-ACISP'01, 2001, LNCS2119, Berlin: Springer-Verlag, 21-35.