Introduction to modern cryptography, UCSD CSE 207 Course Notes, pp.207-95, 2005. ,
Cipher and Hash function design, strategies based on linear and differential cryptanalysis, 1995. ,
A practical approach to the design of high speed self-synchronizing stream ciphers IEEE, 1992. DK08. J. Daemen and P. Kitsos. The self-synchronizing stream cipher moustique, SINGAPORE ICCS/ISITA '92 New Stream Cipher Designs -The eSTREAM Finalists, pp.279-293, 2008. ,
Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the fourteenth annual ACM symposium on Theory of computing , STOC '82, pp.365-377, 1982. ,
DOI : 10.1145/800070.802212
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
New approaches to the design of self-synchronizing stream ciphers Self-synchronizing stream ciphers and dynamical systems: State of the art and open issues, Advances in Cryptology -EUROCRYPT '91, Workshop on the Theory and Application of Cryptographic Techniques Proceedings MG10. Gilles Millerioux and Philippe Guillot, pp.458-4712979, 1991. ,
Handbook of Applied Cryptography, oS80. National Bureau of Standards. Des mode of operations, 1980. ,
Control, synchronization and encryption, 2012. ,
URL : https://hal.archives-ouvertes.fr/tel-00749151
Towards a spectral approach for the design of self-synchronizing stream ciphers, Cryptography and Communications, vol.430, issue.11???12, pp.259-274 ,
DOI : 10.1007/s12095-011-0046-2
URL : https://hal.archives-ouvertes.fr/hal-00540853
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation, IACR Cryptology ePrint Archive, p.14, 2003. ,
DOI : 10.1007/978-3-540-24582-7_3