[1] Wan D Q, Shiue P J S, Chen C S. Value sets of polynomials over finite fields [J]. Proceedings of the American Mathematical Society, 1993, 119(3):711-717.[2] Lidl R, Niederreiter H. Finite Fields [M]. 2nd ed. New York: Cambridge University Press, 1997.[3] Braeken A, Lano J, Mentens N, et al. SFINK: a synchronous stream cipher for restricted hardware environments[R/OL].[2013-12-20]. eStream, ECRYPT Stream Cipher Project, Reprot 2005/035, 2005. http://www.ecrypt.eu.org/stream.[4] Si W P, Ding C S. A simple stream cipher with proven properties [J]. Cryptography and Communications, 2012, 4(2): 79-104.[5] Wu B F, Liu Z J. Linearized polynomials over fnite felds revisited[J]. Finite Fields and Their Applations, 2013, 22: 79-100.[6] Wu B F. Lineatized and linearized derived permutation polynomials over finite fields and their compositional inverses[D]. Beijing: University of Chinese Academy of Sciences, 2013(in Chinese).[7] Dembowski P, Ostrom T. Planes of oeder n with collineation groups of order n2[J]. Design, Codes and Cryptography, 1968, 193(3): 239-258.[8] Liu M L. Geometry of alternate matrices [J]. Acta Mathematica Sinica, 1966, 16(1): 104-135(in Chinese). |