[1] Håkan Englund, Thomas Johansson, and Meltem Sönmez Turan. A Framework for Chosen IV Statistical Analysis of Stream Ciphers. In Proceedings of the cryptology 8th international conference on Progress in cryptology, INDOCRYPT'07, pages 268-281, Berlin, Heidelberg, 2007. Springer- Verlag.
[2] Markku juhani O. Saarinen. Chosen-IV Statistical Attacks on Estream Stream Ciphers. In eSTREAM, ECRYPT Stream Cipher Project, Report 2006/013, pages 5-19, 2006.
[3] Eric Filiol. A New Statistical Testing for Symmetric Ciphers and Hash Functions. In Proceedings of the 4th International Conference on Information and Communications Security, ICICS '02, pages 342-353, London, UK, UK, 2002. Springer-Verlag.
[4] K. Pearson. On The Criterion that a Given System of Deviations from the Probable in the Case of a Correlated System of Variables is Such that it Can be Reasonably Supposed to Have Arisen from Random Sampling. Philosophical Magazine Series, 5(50):157-175, 1900.
[5] M.G. Kendall, A. Stuart, J.K. Ord, and S.F. Arnold. Kendall's Advanced Theory of Statistics: Classical inference and relationship. Number v. 2 in Kendall's library of statistics. Arnold, 1999.
[6] Simon Fischer, Shahram Khazaei, and Willi Meier. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology, AFRICACRYPT'08, pages 236-245, Berlin, Heidelberg, 2008. Springer-Verlag.
[7] Itai Dinur and Adi Shamir. Cube Attacks on Tweakable Black Box Polynomials. In Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques, EUROCRYPT'09, pages 278-299, Berlin, Heidelberg, 2009. Springer-Verlag.
[8] Christophe De Cannière. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In Proceedings of the 9th international conference on Information Security, ISC'06, pages 171-186, Berlin, Heidelberg, 2006. Springer-Verlag.
[9] M. Vielhaber. Breaking One.Fivium by AIDA an Algebraic IV Differential Attack, 2007. IACR ePrint Archive, Report 2007/413. AVailable from http://eprint.iacr.org/2007/413.pdf.
[10] Jean-Philippe Aumasson, Itai Dinur, Willi Meier, and Adi Shamir. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In Fast Software Encryption, pages 1-22, Berlin, Heidelberg, 2009. Springer-Verlag.