02f7990be2570e7c.tex
1: \begin{thebibliography}{99}
2: \bibitem{RC6} R. L. Rivest, M. J. B. Robshaw, R. Sidney , and Y. L. Yin, The RC6 Block Cipher, https://people.csail.mit.edu/rivest/pubs/RRSY98.pdf.
3: \bibitem{Umeno-Kim-Hasegawa} K. Umeno, S. Kim, and A. Hasegawa, 128bit VSC Specification, http://www.chaosware.com/vsc128.pdf (In Japanese).
4: \bibitem{Iwasaki-Umeno} A. Iwasaki and K. Umeno, Improving security of Vector Stream Cipher, Nonlinear Theory and Its Applications,
5: {\bf 7} (2016), 30-37. 
6: \bibitem{Kyouritsu}
7: K. Umeno, Complex systems and communication, in: Information systems as complex systems, Waseda University Advanced Institute for Complex Systems ed., pp. 181-250, Kyouritsu-syuppansya, Tokyo, 2007 (In Japanese).
8: \bibitem{Knuth} D. E. Knuth, The Art of Computer Programming. VoI. 2, Addison-Wesley, Upper Saddle River, 1981.
9: \bibitem{Coveyou}R. Coveyou, Random Number Generation Is Too Important to Be Left to Chance, Studies in Applied Mathematics, III (1970), 70-111.
10: \bibitem{Rivest} R. L. Rivest, Permutation polynomials modulo $2^w$,  Finite Fields and their
11: Applications, {\bf 7} (2001), 287-292.
12: \bibitem{Iwasaki-Umeno-arxiv}A. Iwasaki and K. Umeno, Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module $2^w$,  arXiv:1602.08238v2, 2016.
13: 
14: \end{thebibliography}
15: