Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Fomichev V. M., Methods of Discrete Mathematics in Cryptology, Dialog-MEPhI Publ, 2010 (In Russian)
[2] Lidl R., Niederreiter H., Finite fields, Cambridge university press, 1997 | MR
[3] Fan X., Mandal K., Gong G., “Wg-8: A lightweight stream cipher for resource-constrained smart devices”, International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 2013, 617–632 | DOI
[4] Kamlovskii O.V., “Distribution of $r$-tuples in one class of uniformly distributed sequences over residue rings”, Problems of Information Transmission, 50:1 (2014), 90–105 | DOI | MR | Zbl
[5] Kamlovskii O.V., “Equidistributed sequences over finite fields produced by one class of linear recurring sequences over residue rings”, Problems of Information Transmission, 50:1 (2014), 171–185 | DOI | MR | Zbl
[6] Sachkov V., Introduction to combinatorial methods of discrete mathematics, Nauka, M., 1982 (In Russian) | MR | Zbl
[7] Kamlovsky O. V., “The number of occurrences of elements in the output sequences of filter generators”, Applied discrete mathematics, 21:3 (2013), 11–25 (In Russian) | DOI
[8] Klein A., Stream ciphers, Springer, 2013 | MR | Zbl
[9] Kronthaler F., Zöllner S., Data Analysis with RStudio, Springer Spektrum, 2021
[10] Ivchenko G. I., Medvedev Y. I., Introduction to Mathematical statistics, 2010 (In Russian) | MR
[11] Kuipers L., Niederreiter H., Uniform distribution of sequences, J. Wiley and Sons, 1974 | MR | Zbl