References
1. Schneier B. Applied cryptography.
Protocols,
algorithms, source texts in C language. - M., Ed.
TRIUMPH, 2003. - 816 p.
2. Kharin Yu.S., Bernik V.I., Matveev G.V., Agievich S.V. Mathematical
and computer bases of
cryptology: Textbook. - Minsk, LLC "New Knowledge", 2003. - 382 p.
3. Asoskov A.V., Ivanov M.A.
Stream ciphers, M:
Kudits-Obraz, 2003. - 336 p.
4. Akbarov D.Ye. Cryptographic methods of information security and their application. - Tashkent, "Mark
of Uzbekistan" publishing house, 2009. - 432 p.
5. http://www.cryptography.ru
6. Musayev A.I. Research the basics of existing stream encryption algorithms
and create new crypto-
resistant algorithms. Master's dissertation in the field of information security. Tashkent, 2008. - 81 p.
7. Suwais K., Samsudin A. New Classification of Existing Stream Ciphers.
Universiti Sains
Malaysia(USM), Malaysia 2010.