[1]
A. Alekseychuk and S. Ignatenko, “Algorithms for evaluation of the SNOW 2.0-like stream ciphers security over residue rings against correlation attacks”, RT, vol. 2, no. 193, pp. 28–34, May 2018.