[1]COURTOIS N, MEIER W. Algebraic attacks on stream ciphers with linear feedback [C]// Advance in Cryptology-EUROCRYPT 2003, LNCS 2656. Berlin: Springer-Verlag, 2003: 345-359.[2]COURTOIS N. Fast algebraic attacks on stream ciphers with linear feedback [C]// Advance in Cryptology-EUROCRYPT 2003, LNCS 2729. Berlin: Springer-Verlag, 2003: 176-194.[3]ARMKNECHT F, KRAUSE M. Algebraic attacks on combiners with memory [C]// Advance in Cryptology-EUROCRYPT 2003, LNCS 2729. Berlin: Springer-Verlag, 2003: 162-175.[4]MIHALJEVIE M, IMAI H. Cryptanalysis of Toyocrypt-HSI stream cipher [J]. IEICE Transactions on Fundamentals, 2002, E85-A(1): 66-73.[5]MEIER W, PASALIC E, CARLET C. Algebraic attacks and de-composition of Boolean function [C]// Advances in Cryptology-Eurocrypt 2004, LNCS 3027. Berlin: Springer-Verlag, 2004: 474-491.[6]DALAI D K, GUPTA K C, MAITRA S. Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity [C]// FSE 2005: Proceedings of the 12th International Workshop on Fast Software Encryption, LNCS 3557. Berlin: Springer-Verlag, 2005: 98-111.[7]LI NA, QI WENFENG. Construction and count of Boolean functions of an odd number of variables with maximum algebraic immunity [J]. Science in China Series F: Information Sciences, 2007, 50(3): 307-317.[8]CARLET C, FENG KEQIN. An infinite class of balanced functions with optimal algebraic immunity, good immunity for fast algebraic attacks and good nonlinearity [C]// ASIACRYPT 2008: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, LNCS 5350. Berlin: Springer-Verlag, 2008: 425-440.[9]CARLET C, DALAI D K, GUPTA K C, et al. Algebraic immunity for crypotographically significant Boolean functions: Analysis and construction [J]. IEEE Transactions on Information Theory, 2006, 52(7): 3105-3121.[10]CARLET C. A method of construction of balanced functions with optimum algebraic immunity [EB/OL]. [2011-04-20]. http://eprint.iacr.org/2006/149.[11]CANTEAUT A, VIDEAU M. Symmetric Boolean functions [J]. IEEE Transactions on Information Theory, 2005, 51(8): 2791-2811.[12]CRAMA Y, HAMMER P. Boolean methods and models [M]. Cambridge, UK: Cambridge University Press, 2006.[13]DING C, XIAO G, SHAN W. The stability theory of stream ciphers [M]. Berlin: Springer-Verlag, 1991. |