Hawkes P, Rose G. Primitive specification and supporting documentation for sober-t16 sub mission to nessie[EB/OL].2000(2000-09-16)[2006-01-04].
[2]
Ekdahl P, Johansson T. Snow—a new stream cipher[EB/OL].2000(2000-11-22)[2006-01-04].
[3]
Rose G, Hawkes P. Turing: a fast stream cipher [C]// Johansson T. Fast Software Encryption 2003. Berlin: Springer-Verlag, 2003:290-306.
[4]
Rueppel R.Analysis and design of stream ciphers [M]. Berlin: Springer-Verlag, 1986:182-187.
[5]
Ekdahl P, Johansson T. Distinguishing attacks on sober-t16 and t32[C]// Daemen J, Rijmen V. Fast Software Encryption2002.Berlin:Springer-Verlag, 2002:210-224.
[6]
Watanabe D, Biryukov A, Canniere C.A disting- uishing attack of snow2.0 with linear masking method[C]// Matsui M, Zuccherato R. Selected Areas in Cryptography 2003. Berlin: Springer- Verlag, 2004:222-233.
[7]
Wallen J. Linear approximations of addition modulo 2n [C]// Johansson T. Fast Software Encryption 2003.Berlin: Springer-Verlag, 2003: 261-273.
[8]
Maximov A. On linear approximation of modulo sum[C]//Roy B, Meier W. Fast Software Encryp- tion 2004.Berlin:Springer-Verlag,2004:483-484.