[3]〖JP2〗Sonmez M, Kara O.Linear approximations for 2round Trivium[C]//Proc First International Conference on Security of Information and Networks. Gazimagusa,North Cyprus: Trafford Publishing, 2007: 96105.
[4]Maximov A, Biryukov A.Two trivial attacks on Trivium [C]//Carlisle M (Eds).Selected Areas in Cryptography 14th International Workshop. Ottawa, Canada: Springer, 2007: 3655.
[5]PriemuthSchmid D, Biryukov A. Slid pairs in salsa 20 and Trivium[C] //Dipanwita Roy Chowdhury(Eds). INDOCRYPT, 2008. India: Springer, 2008:114.
[6]Dinur I, Shamir A. Cube attacks on tweakable black box polynomials[J]. LNCS, 2009, 5479: 278299.
[7]Pasalic E. Key differentiation attacks on stream ciphers[EBOL]. (20081205)[20100103]. http://eprint.iacr.org/〖HJ*5/8〗