C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

A. Braeken, J. Lano, N. Mentens, B. Preneel, and I. Verbauwhede, Sfinks : A synchronous stream cipher for restricted hardware environments. submission to eSTREAM, 2008.

S. Rønjom and C. Cid, Nonlinear Equivalence of Stream Ciphers, Fast Software Encryption, pp.40-54, 2010.
DOI : 10.1007/978-3-642-13858-4_3

M. Amr, G. Youssef, and . Gong, Hyper-bent functions, Advances in Cryptology -EU- ROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, pp.406-419, 2001.

N. Zierler, Linear Recurring Sequences, Journal of the Society for Industrial and Applied Mathematics, vol.7, issue.1, pp.31-48, 1959.
DOI : 10.1137/0107003

R. J. Mceliece, finite Fields for Computer Scientists and Engineers, SECS, vol.23, 1987.
DOI : 10.1007/978-1-4613-1983-2

J. Massey, Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol.15, issue.1, pp.122-127, 1969.
DOI : 10.1109/TIT.1969.1054260

E. R. Berlekamp, Factoring Polynomials Over Finite Fields, Bell System Technical Journal, vol.46, issue.8, pp.1853-1859, 1967.
DOI : 10.1002/j.1538-7305.1967.tb03174.x

N. Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference Proceedings, pp.176-194, 2003.
DOI : 10.1007/978-3-540-45146-4_11

N. Courtois and W. Meier, Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology -EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.345-359, 2003.

Y. Nawaz, G. Gong, and K. Gupta, Upper Bounds on Algebraic Immunity of Boolean Power Functions, Fast Software Encryption, 13th International Workshop, pp.375-389, 2006.
DOI : 10.1007/11799313_24

T. Siegenthaler, Decrypting a Class of Stream Ciphers Using Ciphertext Only, IEEE Transactions on Computers, vol.34, issue.1, pp.81-85, 1985.
DOI : 10.1109/TC.1985.1676518

W. Meier and O. Staffelbach, Fast Correlation Attacks on Stream Ciphers, Advances in Cryptology -EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques Proceedings, pp.301-314, 1988.
DOI : 10.1007/3-540-45961-8_28

A. Canteaut, Fast correlation attacks against stream ciphers and related open problems, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005., pp.49-54, 2005.
DOI : 10.1109/ITWTPI.2005.4638690

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.9958

P. Chose, A. Joux, and M. Mitton, Fast Correlation Attacks: An Algorithmic Point of View, Advances in Cryptology -EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.209-221, 2002.
DOI : 10.1007/3-540-46035-7_14

A. Canteaut and M. Trabbia, Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5, Advances in Cryptology -EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, pp.573-588, 2000.
DOI : 10.1007/3-540-45539-6_40

S. Mesnager, Bent and Hyper-Bent Functions in Polynomial Form and Their Link With Some Exponential Sums and Dickson Polynomials, IEEE Transactions on Information Theory, vol.57, issue.9, pp.5996-6009, 2011.
DOI : 10.1109/TIT.2011.2124439

M. M. Gohar, V. Kyureghyan, and . Suder, On inversion in 2 n -1 . Finite Fields and Their Applications, pp.234-254, 2014.

A. Canteaut, Encyclopedia of Cryptography and Security, 2011.

L. Edwin and . Key, An analysis of the structure and complexity of nonlinear binary sequence generators, IEEE Transactions on Information Theory, vol.22, issue.6, pp.732-736, 1976.

G. Gong, S. Rønjom, T. Helleseth, and H. Hu, Fast Discrete Fourier Spectra Attacks on Stream Ciphers, IEEE Transactions on Information Theory, vol.57, issue.8, pp.5555-5565, 2011.
DOI : 10.1109/TIT.2011.2158480

P. Charpin and G. Gong, Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials, IEEE Transactions on Information Theory, vol.54, issue.9, pp.4230-4238, 2008.
DOI : 10.1109/TIT.2008.928273

S. Mesnager, Hyper-bent Boolean Functions with Multiple Trace Terms, Arithmetic of Finite Fields, Third International Workshop, WAIFI 2010 Proceedings, pp.97-113, 2010.
DOI : 10.1007/978-3-642-13797-6_8

A. A. Nechaev, A. S. Kuzmin, V. T. Markov, and A. B. Shishkov, Approximation of boolean functions by monomial ones, Discrete Math. Appl, vol.16, issue.1, pp.7-28, 2006.