[1]冯登国.密码分析学[M].北京:清华大学出版社,2000:5592[2]Armknecht F. Algebraic attacks on certain stream ciphers[D]. Germany: School of Business Informatics and Mathematics, University Mannheim, 2006[3]Armknecht F, Krause M. Algebraic attacks on combiners with memory[C]//Boneh D. CRYPTO 2003 Germany: Springer Berlin, 2003:162175[4]Gong G, Ronjom S, Helleseth T, et al. Fast discrete fourier spectra attacks on stream ciphers[J]. IEEE Transactions on Information Theory, 2011, 57(8): 55555565[5]Golomb S W, Gong G. Signal design for good correlation for wireless communication, cryptography, and radar[M]. New York: Cambridge University Press, 2005[6]Bluetooth Special Interest Group. Specification of the bluetooth system, Version 11[EB/OL]. (20000315)[20111022]. http://www.bluetooth.com/.