R. Lidl and H. Niederreiter, Finite Fields In Encyclopedia of Mathematics and its Applications, 1997.

S. W. Golomb and G. Gong, Signal Design for Good Correlation: For Wireless Communication , Cryptography, and Radar, 2004.
DOI : 10.1017/CBO9780511546907

F. Armknecht and M. Krause, Algebraic Attacks on Combiners with Memory, Lecture Notes in Computer Science, vol.2729, pp.162-176, 2003.
DOI : 10.1007/978-3-540-45146-4_10

F. Armknecht, Improving Fast Algebraic Attacks, Lecture Notes in Computer Science, vol.3017, pp.65-82, 2004.
DOI : 10.1007/978-3-540-25937-4_5

P. Hawkes and G. G. Rose, Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers, Advances in Cryptology -CRYPTO 2004: 24th Annual International Cryptology Conference Proceedings, Lecture Notes in Computer Science, 2004.
DOI : 10.1007/978-3-540-28628-8_24

F. Armknecht and G. Ars, Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity, Mycrypt 2005 (International Conference on Cryptology in Malaysia), pp.16-32, 2005.
DOI : 10.1007/11554868_3

URL : https://hal.archives-ouvertes.fr/hal-01351381

N. Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Lecture Notes in Computer Science, vol.2729, pp.176-194, 2003.
DOI : 10.1007/978-3-540-45146-4_11

I. E. Shparlinski, On the singularity of generalised Vandermonde matrices over finite fields, Finite Fields and Applications, pp.193-199, 2005.
DOI : 10.1016/j.ffa.2004.11.001

N. Courtois and W. Meier, Algebraic Attacks on Stream Ciphers with Linear Feedback, Lecture Notes in Computer Science, vol.2656, pp.345-359, 2003.
DOI : 10.1007/3-540-39200-9_21

G. Gong, S. Rønjom, T. Helleseth, and H. Hu, Fast linear subspace attacks on stream ciphers

W. Meier, E. Pasalic, and C. Carlet, Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology ? EUROCRYPT, pp.474-491, 2004.
DOI : 10.1007/978-3-540-24676-3_28

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms UEA& UIA2 Document 2: Snow 3G Specification (version 1.1), 2006.

S. Rønjom and T. Helleseth, A New Attack on the Filter Generator, IEEE Transactions on Information Theory, vol.53, issue.5, pp.17520-1758, 2007.
DOI : 10.1109/TIT.2007.894690

M. D. Aagaard, G. Gong, and R. K. Mota, Hardware implementations of the WG-5 cipher for passive RFID tags, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.29-34, 2013.
DOI : 10.1109/HST.2013.6581561

Y. Luo, Q. Chai, G. Gong, and X. Lai, A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-6, 2010.
DOI : 10.1109/GLOCOM.2010.5684215

X. Fan, . Mandal, . Kalikinkar, and G. Gong, WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices, Quality, Reliability, Security and Robustness in Heterogeneous Networks,Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

X. Fan and G. Gong, Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms

Y. Nawaz and G. Gong, The WG Stream Cipher, EU ECRYPT eSTREAM competition

S. Rønjom and T. Helleseth, Attacking the Filter Generator over GF(2 m ), Lecture Notes in Computer Science, vol.4547, pp.264-275, 2007.
DOI : 10.1007/978-3-540-73074-3_20

T. Helleseth and S. Rønjom, Simplifying algebraic attacks with univariate analysis, 2011 Information Theory and Applications Workshop, pp.1-7, 2011.
DOI : 10.1109/ITA.2011.5743578

N. Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology -CRYPTO 2003, number 2729 in Lecture Notes in Computer Science, pp.176-194, 2003.
DOI : 10.1007/978-3-540-45146-4_11

M. Orumiehchiha, J. Pieprzyk, and R. Steinfeld, Cryptanalysis of WG-7: a lightweight stream cipher, Cryptography and Communications, pp.3-4, 2012.
DOI : 10.1007/s12095-012-0070-x