Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Lidl R., Niderraiter G., Konechnye polya, V 2 t., v. 2, Mir, M., 1988 | MR
[2] Nikonov V. G., Sarantsev A. V., “O slozhnosti sovmestnoi realizatsii v bazise DNF regulyarnykh sistem bulevykh funktsii”, Matematicheskie voprosy kriptografii, 1:1 (2010), 45–65 | DOI | Zbl
[3] Rozhkov M. I., “Biektivnye otobrazheniya, porozhdaemye filtruyuschim generatorom”, Prikladnaya diskretnaya matematika, 1:23 (2014), 27–39
[4] Rozhkov M. I., “K voprosu postroeniya ortogonalnykh sistem dvoichnykh funktsii s ispolzovaniem registra sdviga”, Lesnoi vestnik, 3:3 (2011), 180–185
[5] Rozhkov M. I., “O nekotorykh klassakh nelineinykh registrov sdviga, obladayuschikh odinakovoi tsiklovoi strukturoi”, Diskretnaya matematika, 22:2 (2010), 96–119 | DOI | Zbl
[6] Sarantsev A. V., “Postroenie regulyarnykh sistem odnotipnykh dvoichnykh funktsii s ispolzovaniem registra sdviga”, Lesnoi vestnik, 32:1 (2004), 164–169
[7] B. A. Pogorelov, V. N. Sachkov (red.), Slovar kriptograficheskikh terminov, MTsNMO, M., 2006, 94 pp.
[8] Cheremushkin A. V., “Metody affinnoi i lineinoi klassifikatsii dvoichnykh funktsii”, Trudy po diskretnoi matematike, 4 (2001), 273–314
[9] SHA-3 Standard: Permutation-Based Hash and Extenable-Output Functions, FIPS PUBS 202, NIST, 2015