[ 1 ] T Siegenthaler.Correlation immunity of nonlinear combining functions for cryptographi c appli cations.IEEE Transaction on Informat ion Theory,1984, IT-30, 776 —780. [ 2] T Siegenthaler.Decrypting a class of st ream ciphers using ciphertext only.IEEE Transaction on Computers, 1985, C-34 :81 —85. [ 3] W Meier, O Staffelbach.Nonlinear criteria for cryptographic functions.Advance in Cryptology-Eurocrypt' 89.Berlin :Springer-Verlag,1990.549 —562. [ 4] W Meier, O Staffelbach.Fast correlation attacks on certain st ream ciphers.Journal of cryptology, 1989, 1(3):159 —176. [ 5] V Chepyzhov, B Smeets.On a fast attack on st ream ciphers.Advances in Cryptology-Eurocrypt' 91, Lecture Notes in Computer Science, Vol.547,Berlin :Springer-Verlag, 1991.176 —185. [ 6] R A Rueppel.Correlation immunity and the summation generator.Advances in Cryptology-Crypto' 86.Berlin :Springer-Verlag, 1986.260—272. [ 7] W Meier,O Staffelbach.Correlation properties of combiner with memory in stream cipher.Journal of Cryptology, 1992, (5):67 —86. [ 8] J Dj Goli'c.Correlation properties of a general binary combiner with memory.Journal of Cryptology, 1996, 9:111—126. [ 9] O Staffelbach, W Meier.Cryptographic significance of the carry for ciphers based on integer addition.Advances in Cryptology-Crypto'90, LectureNotes in Computer Science, Vol.537.Berlin :Springer-Verlag, 1991.601 —614. [ 10] J Dj Gol'ic.Mahmoud Salmasizadeh, Ed Dawson.Fast correlation attack on the summation generator.Journal of Cryptology, 2000,13:245262. [ 11] Miia Hermelin, Kaisa Nyberg.Correlation properties of the Bluetooth Combiner, Information Security and Cryptology-ICISC' 99, LectureNotes inComputer Science 1787.Berlin :Springer-Verlag, 2000, 17 —29. [ 12] J Dj Gol'ic, Vittotio Bagini, Guglielmo Morgari.Linear cryptanalysis of Bluetooth Stream cipher.Advances in Cryptology-Eurocrypt' 02,LectureNotes in Computer Science Vol.2332.Berlin :Springer-Verlag, 2002.238 —255 |