E. R. Berlekamp, Algebra Coding Theory, MecGraw-Hill, New York, (1986).R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, Berlin Heidelberg, (1986).[2]C. Ronse, Feedback Shift Register, Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg, (1984).[3]N. Zieler, J. Soc. Indust. Appl. Math., 7(1959) 3, 37-48.[4]李獻(xiàn)剛,肖國鎮(zhèn),橢圓曲線與序列密碼,1989年全國信息論與通訊理論學(xué)術(shù)討論會(huì)報(bào)告,青島,1989年10月.[5]J. A. Reeds, H. J. A. Sloane, Shift Register Synthesis m. Math. and Statistic Research Centerr,Bell Lab., Murray Hill, NJ07974.[6]I.[J].F. Blake, Inform. Contr.1975,29:-[7]Eugene Spiegel.[J].Inform. Control.1977,35:-[8]周錦君,戚文鋒,Z/(m)上線性遞歸序列的若干特性,國外通信保密研討會(huì)會(huì)議錄,襄樊,1987年第187-201頁.[9]陳立東,整數(shù)環(huán)上線性遞歸序列的分析,第三屆全國密碼學(xué)會(huì)會(huì)議錄,西安,1988年,第29-35頁.[10]李獻(xiàn)剛,中國剩余定理與Z/(m)上的遞歸序列,1989年全國信息論與通訊理論學(xué)術(shù)討論會(huì)報(bào)告,青島,1989年.[11]Li Xiangang, The Linear Recurring Sequences over Residue Class Ring Z/(m), 1990 IEEE International Symposium on Information Theory, San Diego, California, Jan. 14, (1990).[12]李獻(xiàn)剛, Z/(m)(x)上的一個(gè)定理及其應(yīng)用,1989年全國首屆青年通信學(xué)術(shù)會(huì)議會(huì)議錄,北京,1989年11月,第67-70頁.[13]N. Koblitz, P-adic Numbers, P-adic Analysis, and Zeta-Functions, 2nd ed., Springer-Verlag, (1984).[14]R. Lidl, N. Niederreiter, Finite Fields, Addison-Wesley Publishing Company, (1983).[15]K. Ireland, M. Rosen, A Classical Introduction to Modern Number Theory, Springer-Verlag, (1982).
|