| Bruce Schneier, Applied Cryptology, 254-255, chapter 17, Oct. 1994.* |
| Robert McEliece, Finite Fields for Computer Scientist and Engineers chapter 6, 7, 8, 1987.* |
| Neal Koblitz, Algebraic Aspects of Cryptology, Springer-Verlag 55-64, 1991.* |
| Bernard Sklar, Digital Communications, Prentice Hall, pp. 290298, 1988.* |
| Schneier, “Angewandte kryptographie”, Addison-Wesley Publishing Company, pp. 434-435, 1996 (with Prior Art Statement attached). |
| Sklar, “Digital Communications”, Prentice Hall, Englewood Cliffs, New Jersey, Channel Coding: Part 1, Chap. 5, pp. 290-298, 1988. |
| Copy of German Search Report for 197 33 829, dated Mar. 31, 1998. |
| Bruche Schneier, “Applied Cryptography”, 1996, USA Chapter 17, “Other Stream Ciphers and Real Random-Sequence Generators”, pp. 397, 398,420. |
| Karmel M. Shaheen, “Code Bond Cipher System”, Proceedings Of The Annual International Carnahan Conference On Security Technology, USA, IEEE, Oct. 12, 1994, pp. 68-70. |
| D.E. Knuth, “The Art Of Computer Programming. vol. 2/Seminumerical Algorithms . . . ” 1980, USA, pp. 31,32. |
| M. Mihaljevic et al, “A Fast And Secure Stream Cipher Based On Cellular Automata Over GF (Q)”, IEEE Global Telecommunications Conference, USA, NY IEEE, 1998, pp. 3250-3255. |
| European Search Report, EP 98113474, Oct. 2, 2000. |