[1]Sarkar P, Maitra S. Efficient implementation of “Large” stream cipher systems[J]. Lecture Notes in Computer Science, 2001, 2162: 319332.[2]曲英杰. 可重组密码逻辑的设计原理[D]. 北京: 北京科技大学计算机系, 2002.[3]秦晓懿, 王瀚晟, 曾烈光. 线性和非线性寄存器系统的并行化技术[J]. 电子学报, 2003, 31 (3): 406410.QIN Xiaoyi, WANG Hansheng, ZENG Lieguang. Paralleling techniques for linear and nonlinear register systems [J]. Acta Electronica Sinica, 2003, 31 (3): 406410.[4]万哲先, 代宗铎, 刘木兰. 非线性移位寄存器[M]. 北京: 科学出版社, 1978.[5]Biham E, Shamir A. Differential cryptanalysis of the data encryption standard [M]. New York: SpringerVerlag, 1993.[6]万哲先, 代宗铎, 刘木兰. 非线性移位寄存器[M]. 北京: 科学出版社, 1978.[7]Maximov A. Cryptanalysis of the grain family of stream ciphers [C]∥ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2006: 283288.[8]Johansson T, Meier W, Muller F. Cryptanalysis of achterbahn [J]. Lecture Notes in Computer Science, 2006, 4047: 114.[9]温巧燕, 钮心忻, 杨义先. 现代密码学中的布尔函数[M]. 北京: 科学出版社, 2000.[10]李云强, 孙怀波, 王爱兰. 布尔函数和伪布尔函数多项式表示的快速实现算法[J]. 计算机工程与应用, 2007, 43(1): 5052.LI Yunqiang, SUN Huaibo, WANG Ailan. Fast algorithms for polynomial representations of boolean functions and pseudoboolean functions [J]. Computer Engineering and Applications, 2007, 43 (1): 5052.[11]Dai Z B, Li W, Chen T, et al. Design and Implementation of a highspeed reconfigurable feedback shift register [C]∥4th IEEE International Conference on Circuits and Systems for Communications. Shanghai: IEEE, 2008: 338342. |