Bruce Schneier, Applied Cryptology, 254-255, chapter 17, Oct. 1994.* |
Robert McEliece, Finite Fields for Computer Scientist and Engineers chapter 6, 7, 8, 1987.* |
Neal Koblitz, Algebraic Aspects of Cryptology, Springer-Verlag 55-64, 1991.* |
Bernard Sklar, Digital Communications, Prentice Hall, pp. 290298, 1988.* |
Schneier, “Angewandte kryptographie”, Addison-Wesley Publishing Company, pp. 434-435, 1996 (with Prior Art Statement attached). |
Sklar, “Digital Communications”, Prentice Hall, Englewood Cliffs, New Jersey, Channel Coding: Part 1, Chap. 5, pp. 290-298, 1988. |
Copy of German Search Report for 197 33 829, dated Mar. 31, 1998. |
Bruche Schneier, “Applied Cryptography”, 1996, USA Chapter 17, “Other Stream Ciphers and Real Random-Sequence Generators”, pp. 397, 398,420. |
Karmel M. Shaheen, “Code Bond Cipher System”, Proceedings Of The Annual International Carnahan Conference On Security Technology, USA, IEEE, Oct. 12, 1994, pp. 68-70. |
D.E. Knuth, “The Art Of Computer Programming. vol. 2/Seminumerical Algorithms . . . ” 1980, USA, pp. 31,32. |
M. Mihaljevic et al, “A Fast And Secure Stream Cipher Based On Cellular Automata Over GF (Q)”, IEEE Global Telecommunications Conference, USA, NY IEEE, 1998, pp. 3250-3255. |
European Search Report, EP 98113474, Oct. 2, 2000. |