[1] E. Key, ” An analysis of the structure and complexity of nonlinear binary sequence generators,” IEEE Transactions on Information Theory, Nov. 1976, Vol. 22, pp.732-736.
[2] G. J. Kuhn, ” Algorithms for self-synchronizing ciphers,” Southern African Conference on Communications and Signal Processing, June 1988, pp. 159-164.
[3] G.-Z. Xiao, and J. L. Massey, "A spectral characterization of correlation-immune combining functions,” IEEE Transactions on Information Theory, May 1988, Vol. 34, pp. 569-571.
[4] J. C. Hernandez, P. Isasi, J.M. Sierra, C. Mex-Perera and B. Ramos, “Using classifiers to predict linear feedback shift registers,” 2001 IEEE 35th International Carnahan Conference on Security Technology, Oct. 2001, pp. 240-249.
[5] J. D. Golic, Clark, A. and Dawson, E. “Generalized inversion attack on nonlinear filter generators,” IEEE Transactions on Computers, Oct. 2000, Vol. 49, pp.1100-1109.
[6] J. L. Massey, “A self-synchronizing digital scrambler for cryptographic protection of data,”84 International Zurich Seminar on Digital Communications Applications of Source Coding, Channel Coding & Secrecy Coding, 1984.
[7] J. Massey,” Shift-register synthesis and BCH decoding, ”IEEE Transactions on Information Theory, Jan. 1969, Vol. 15, pp.122-127.
[8] K. Zeng, C. -H Yang, D.-Y. Wei, and T.R.N. Rao, ”Pseudorandom bit generators in stream-cipher cryptography,” IEEE on computer, Feb. 1991, Vol. 24, pp.8-17.
[9] M. D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, and C. E. Goutis, ”Comparison of the hardware architectures and FPGA implementations of stream ciphers,” IEEE International Conference on Electronics, Circuits and Systems, Dec. 2004, pp.571-574.
[10] P. Kitsos, G. Kostopoulos, N. Sklavos, and O. Koufopavlou,” Hardware implementation of the RC4 stream cipher,” IEEE International Midwest Symposium on Circuits and Systems, 2003,Vol. 3, pp. 1363-1366.
[11] S. W. Golomb, “Shift register sequences,”Holden-Day, San Francisco Calif., 1967.
[12] Wayne Stahnke, “Primitive binary polynomials,” JSTOR on Mathematics of computation, Oct. 1973, Vol. 27, pp. 977-980.
[13] W. Millan, K. Wong, M. Wark, and E. Dawson, ”A single-chip FPGA implementation of a self-synchronous cipher,” IEEE TENCON, Speech and Image technologies for Computing and Telecommunications, Dec. 1997, Vol. 1, pp.223-226.
[14] W. T. Penzhorn, ”Correlation attacks on stream ciphers,” IEEE AFRICON 4th, Sept. 1996, Vol. 2, pp.1093-1098.
[15] 黃宣樹,”使用FPGA實現一串流加密模組之設計與驗證”,國立中央大學,民國九十二年六月。
[16] 黃凱群,”串流密碼中組合函數安全性之研究”,國立交通大學,民國九十二年五月。[17] 劉彥廷、吳中斌、張仁俊,”遠端連線附加安全協定之設計”,明新學報,第24期,民國八十九年六月。[18] 賴溪松、韓亮、張真誠,近代密學及其應用,松崗電腦圖書資料服份有限公司,1999。