J. Arney and E. A. Bender, Random mappings with constraints on coalescence and number of origins, Pacific Journal of Mathematics, vol.103, issue.2, pp.269-294, 1982.
DOI : 10.2140/pjm.1982.103.269

F. Ab05a, T. P. Arnault, and . Berger, Design and properties of a new pseudorandom generator based on a filtered FCSR automaton, IEEE Trans. Computers, vol.54, issue.11, pp.1374-1383, 2005.

F. Arnault, P. Thierry, and . Berger, F-FCSR: Design of a New Class of Stream Ciphers, Fast Software Encryption -FSE 2005, pp.83-97, 2005.
DOI : 10.1007/11502760_6

URL : https://hal.archives-ouvertes.fr/hal-00068453

[. Arnault and T. P. Berger, Correction to "feedback with carry shift registers synthesis with the euclidean algorithm, IEEE Transactions on Information Theory, vol.54, issue.1, pp.910-917502, 2008.

[. Arnault, T. Berger, and C. Lauradoux, Update on F-FCSR stream cipher. eSTREAM, ECRYPT Stream Cipher Project, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00068476

[. Arnault, P. Thierry, C. Berger, and . Lauradoux, F-FCSR Stream Ciphers, New Stream Cipher Designs, pp.170-178, 2008.
DOI : 10.1007/978-3-540-68351-3_13

URL : https://hal.archives-ouvertes.fr/hal-00336871

[. Arnault, P. Thierry, C. Berger, M. Lauradoux, and . Minier, X-FCSR ??? A New Software Oriented Stream Cipher Based Upon FCSRs, Progress in Cryptology - INDOCRYPT 2007, pp.341-350, 2007.
DOI : 10.1007/978-3-540-77026-8_26

URL : https://hal.archives-ouvertes.fr/hal-00336867

F. Arnault, P. Thierry, M. Berger, and . Minier, Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators, IEEE Transactions on Information Theory, vol.54, issue.2, pp.836-840, 2008.
DOI : 10.1109/TIT.2007.913244

[. Arnault, P. Thierry, A. Berger, and . Necer, A New Class of Stream Ciphers Combining LFSR and FCSR Architectures, Progress in Cryptology -INDOCRYPT 2002, pp.22-33, 2002.
DOI : 10.1007/3-540-36231-2_3

URL : https://hal.archives-ouvertes.fr/hal-00068427

[. Arnault, P. Thierry, A. Berger, and . Necer, Feedback With Carry Shift Registers Synthesis With the Euclidean Algorithm, IEEE Transactions on Information Theory, vol.50, issue.5, pp.910-917, 2004.
DOI : 10.1109/TIT.2004.826651

URL : https://hal.archives-ouvertes.fr/hal-00068422

S. H. Babbage, Improved ???exhaustive search??? attacks on stream ciphers, European Convention on Security and Detection, pp.161-166, 1995.
DOI : 10.1049/cp:19950490

O. Berbain, A. Billet, N. Canteaut, H. Courtois, L. Gilbert et al., Sosemanuk, a Fast Software-Oriented Stream Cipher, New Stream Cipher Designs, pp.98-118, 2008.
DOI : 10.1007/978-3-540-68351-3_9

URL : https://hal.archives-ouvertes.fr/hal-00328825

J. Bourgain, T. Cochrane, J. Paulhus, and C. Pinner, Decimations of $\ell$-Sequences and Permutations of Even Residues $\modp$, SIAM Journal on Discrete Mathematics, vol.23, issue.2, pp.842-857, 2009.
DOI : 10.1137/080737678

[. Bays and S. D. Durham, Improving a Poor Random Number Generator, ACM Transactions on Mathematical Software, vol.2, issue.1, pp.59-64, 1976.
DOI : 10.1145/355666.355670

S. Babbage and M. Dodd, The stream cipher MICKEY (version 1). eSTREAM, ECRYPT Stream Cipher Project, Report, vol.015, 2005.

S. Babbage and M. Dodd, The MICKEY Stream Ciphers The eS- TREAM Finalists, New Stream Cipher Designs, pp.20-38, 2008.

E. R. Berlekamp, Algebraic Coding Theory, chapter 7 and 10, 1968.

E. R. Berlekamp, Nonbinary BCH decoding (Abstr.), IEEE Transactions on Information Theory, vol.14, issue.2, p.242, 1968.
DOI : 10.1109/TIT.1968.1054109

J. Daniel and . Bernstein, The Salsa20 Family of Stream Ciphers The eSTREAM Finalists, New Stream Cipher Designs, pp.84-97

C. Banderier, P. Flajolet, G. Schaeffer, and M. Soria, Random maps, coalescing saddles, singularity analysis, and Airy phenomena, Random Structures and Algorithms, vol.15, issue.3, pp.3-4194, 2001.
DOI : 10.1002/rsa.10021

URL : https://hal.archives-ouvertes.fr/inria-00108014

M. Blum and S. Goldwasser, An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information, Advances in Cryptology -CRYPTO'84, pp.289-302, 1984.
DOI : 10.1007/3-540-39568-7_23

M. Bucci, L. Germani, R. Luzzi, A. Trifiletti, and M. Varanonuovo, A high-speed oscillator-based truly random number source for cryptographic applications on a smartcard IC, IEEE Transactions on Computers, vol.52, issue.4, pp.403-409, 2003.
DOI : 10.1109/TC.2003.1190581

P. Thierry, M. Berger, and . Minier, Two algebraic attacks against the F- FCSRs using the IV mode, Progress in Cryptology -INDOCRYPT 2005, pp.143-154, 2005.

A. Biryukov and A. Shamir, Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, Advances in Cryptology - ASIACRYPT 2000, pp.1-13, 1976.
DOI : 10.1007/3-540-44448-3_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Boesgaard, M. Vesterager, and E. Zenner, The Rabbit Stream Cipher The eSTREAM Finalists, New Stream Cipher Designs, pp.68-83, 2008.

T. W. Cusick, C. Ding, and A. Renvall, Stream Ciphers and Number Theory. North-Holland Mathematic Library, 1998.

K. Chen, M. Henricksen, W. Millan, J. Fuller, L. R. Simpson et al., Dragon: A Fast Word Based Stream Cipher, Lecture Notes in Computer Science, vol.3506, pp.33-50, 2004.
DOI : 10.1007/11496618_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

V. Vladimor, T. Chepyzhov, B. Johansson, and . Smeets, A simple algorithm for fast correlation attacks on stream ciphers, Fast Software Encryption -FSE 2000, pp.181-195, 1978.

[. Couture and P. Ecuyer, On the lattice structure of certain linear congruential sequences related to AWC/SWB generators, Mathematics of Computation, vol.62, issue.206, pp.799-808, 1994.
DOI : 10.1090/S0025-5718-1994-1220826-X

[. Couture and P. Ecuyer, Distribution properties of multiply-with-c arry random number generators, Mathematics of Computation, vol.66, issue.218, pp.591-607, 1997.
DOI : 10.1090/S0025-5718-97-00827-2

N. Courtois and W. Meier, Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology -EUROCRYPT 2003, pp.345-359
DOI : 10.1007/3-540-39200-9_21

Y. Joo, J. Cho, and . Pieprzyk, An improved distinguisher for dragon. eSTREAM, ECRYPT Stream Cipher Project, 2007.

M. Thomas, J. A. Cover, and . Thomas, Elements of Information Theory, 1991.

[. Denning, Cryptography and data security, 1982.

E. Dawson, M. Hendricksen, and L. Simpson, The Dragon Stream Cipher: Design, Analysis, and Implementation Issues, New Stream Cipher Designs, pp.20-38, 2008.
DOI : 10.1007/978-3-540-68351-3_3

M. Dichtl, Bad and Good Ways of Post-processing Biased Physical Random Numbers, Lecture Notes in Computer Science, vol.4593, pp.137-152, 2007.
DOI : 10.1007/978-3-540-74619-5_9

P. Diaconis and F. Mosteller, Methods for Studying Coincidences, Journal of the American Statistical Association, vol.4, issue.15, pp.853-861, 1989.
DOI : 10.1080/01621459.1989.10478847

M. Drmota and M. Soria, Images and Preimages in Random Mappings, SIAM Journal on Discrete Mathematics, vol.10, issue.2, pp.246-269, 1997.
DOI : 10.1137/S0895480194268421

M. M. Benjamin and . De-weger, Approximation lattices of p-adic numbers, J. Number Theory, vol.24, issue.1, pp.70-88, 1979.

[. Englund and A. Maximov, Attack the Dragon, Progress in Cryptology -INDOCRYPT 2005, pp.130-142, 2005.
DOI : 10.1007/11596219_11

[. Ergün and S. Özoguz, A Truly Random Number Generator Based on a Continuous-Time Chaotic Oscillator for Applications in Cryptography, Lecture Notes in Computer Science, vol.3733, pp.205-214, 2005.
DOI : 10.1007/11569596_23

P. Flajolet, É. Fusy, X. Gourdon, D. Panario, and N. Pouyanne, A hybrid of Darboux's method and singularity analysis in combinatorial asymptotics, Electr. J. Comb, vol.13, issue.1, 2006.

J. A. Fill, P. Flajolet, and N. Kapur, Singularity analysis, Hadamard products, and tree recurrences, Journal of Computational and Applied Mathematics, vol.174, issue.2, pp.271-313, 2005.
DOI : 10.1016/j.cam.2004.04.014

URL : http://doi.org/10.1016/j.cam.2004.04.014

E. Filiol, Decimation Attack of Stream Ciphers, Progress in Cryptology -INDOCRYPT 2000, pp.31-42, 2000.
DOI : 10.1007/3-540-44495-5_4

URL : https://hal.archives-ouvertes.fr/inria-00072656

P. Flajolet, Singularity analysis and asymptotics of Bernoulli sums, Theoretical Computer Science, vol.215, issue.1-2, pp.371-381, 1999.
DOI : 10.1016/S0304-3975(98)00220-5

URL : https://hal.archives-ouvertes.fr/inria-00073289

S. Fischer, W. Meier, and D. Stegemann, Equivalent representations of the F-FCSR keystream generator, SASC 2008, pp.87-96, 2008.

P. Flajolet and A. M. Odlyzko, Random Mapping Statistics, Advances in Cryptology -EUROCRYPT'89, pp.329-354, 1989.
DOI : 10.1007/3-540-46885-4_34

URL : https://hal.archives-ouvertes.fr/inria-00075445

P. Flajolet and A. Odlyzko, Singularity Analysis of Generating Functions, SIAM Journal on Discrete Mathematics, vol.3, issue.2, pp.216-240, 1990.
DOI : 10.1137/0403019

URL : https://hal.archives-ouvertes.fr/inria-00075725

P. Flajolet and R. Sedgewick, Analytic Combinatorics. preprint, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00072739

G. Liang, F. , and K. K. Tzeng, A Generalization of the Berlekamp- Massey Algorithm for Multisequence Shift-Register Synthesis with Applications to Decoding Cyclic Codes, IEEE Transactions on Information Theory, vol.37, issue.5, pp.1274-1287, 1991.

[. Gauss, Disquisitiones Arithmeticae. reprinted in 1965 by, 1801.

T. Good and M. Benaissa, Hardware results for selected stream cipher candidates. eSTREAM, ECRYPT Stream Cipher Project, Report, vol.023, 2007.

M. Goresky and A. Klapper, Feedback registers based on ramified extensions of the 2-adic numbers, Advances in Cryptology -EUROCRYPT'94, pp.215-222, 1994.
DOI : 10.1007/BFb0053437

M. Goresky and A. Klapper, Arithmetic crosscorrelations of feedback with carry shift register sequences, IEEE Transactions on Information Theory, vol.43, issue.4, pp.1342-1345, 1997.
DOI : 10.1109/18.605605

M. Goresky and A. Klapper, Fibonacci and Galois representations of feedback-with-carry shift registers, IEEE Transactions on Information Theory, vol.48, issue.11, pp.2826-2836, 2002.
DOI : 10.1109/TIT.2002.804048

M. Goresky and A. Klapper, Efficient multiply-with-carry random number generators with maximal period, ACM Transactions on Modeling and Computer Simulation, vol.13, issue.4, pp.310-321, 2003.
DOI : 10.1145/945511.945514

M. Goresky and A. Klapper, Periodicity and Correlation Properties of d-FCSR Sequences, Designs, Codes and Cryptography, vol.33, issue.2, pp.123-148, 2004.
DOI : 10.1023/B:DESI.0000035467.93014.90

M. Goresky and A. Klapper, Periodicity and Distribution Properties of Combined FCSR Sequences, Sequences and Their Applications - SETA 2006, pp.334-341
DOI : 10.1007/11863854_29

M. Goresky and A. Klapper, Algebraic Shift Register Sequences. preprint, 2008.
DOI : 10.1017/cbo9781139057448

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Goresky, A. Klapper, R. Murty, and I. Shparlinski, On Decimations of $\ell$-Sequences, SIAM Journal on Discrete Mathematics, vol.18, issue.1, pp.130-140, 2004.
DOI : 10.1137/S0895480102403428

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : http://doi.org/10.1016/0022-0000(84)90070-9

W. Solomon and . Golomb, Shift Register Sequences, 1981.

[. Goldreich, A note on computational indistinguishability, Information Processing Letters, vol.34, issue.6, pp.277-281, 1990.
DOI : 10.1016/0020-0190(90)90010-U

J. Dj and . Golic, Cryptanalysis of alleged A5 stream cipher, Advances in Cryptology -EUROCRYPT'97, pp.239-255, 1997.

I. Goldberg and D. Wagner, Randomness and the Netscape browser, Dr. Dobbs Journal, Jannuary, 1996.

V. L. Ralph and . Hartley, Transmission of information, Bell System Technical Journal, vol.7, issue.4, pp.535-563, 1928.

B. Harris, Probability distributions related to random mappings. The Annals of Mathematical Statistics, pp.1045-1062, 1960.
DOI : 10.1214/aoms/1177705677

E. Martin and . Hellman, A cryptanalytic time-memory trade-off, IEEE Transactions on Information Theory, vol.26, issue.4, pp.401-406, 1980.

M. Hell and T. Johansson, Breaking the F-FCSR-H Stream Cipher in Real Time, Advances in Cryptology -ASIACRYPT 2008, pp.557-569, 2008.
DOI : 10.1007/3-540-58108-1_21

M. Hell, T. Johansson, A. Maximov, and W. Meier, The Grain Family of Stream Ciphers, New Stream Cipher Designs, pp.179-190, 2008.
DOI : 10.1007/978-3-540-68351-3_14

J. Hong and W. Kim, TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY, Progress in Cryptology -IN- DOCRYPT 2005, pp.169-182, 2005.
DOI : 10.1007/11596219_14

[. Hennessy and D. A. Patterson, Computer Architecture -A Quantitative Approach, 2002.

J. Hong and P. Sarkar, New Applications of Time Memory Data Tradeoffs, Advances in Cryptology -ASIACRYPT 2005, pp.353-372, 2005.
DOI : 10.1007/11593447_19

J. Lano, J. Daemen, and B. Preneel, Chosen Ciphertext Attack on SSS. eSTREAM, ECRYPT Stream Cipher Project, Report, vol.044, 2005.

H. [. Johansson and . Floberg, Random number generation by chaotic double scroll oscillator on chip, ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349), pp.407-409, 1999.
DOI : 10.1109/ISCAS.1999.777595

É. Jaulmes and F. Muller, Cryptanalysis of ECRYPT candidates F- FCSR-8 and F-FCSR-H. eSTREAM, ECRYPT Stream Cipher Project, Report, vol.046, 2005.

É. Jaulmes and F. Muller, Cryptanalysis of the F-FCSR Stream Cipher Family, Selected Areas in Cryptography, pp.20-35, 2005.
DOI : 10.1007/11693383_2

A. Joux and F. Muller, Chosen-Ciphertext Attacks Against MOSQUITO, Lecture Notes in Computer Science, vol.4047, pp.390-404, 2006.
DOI : 10.1007/11799313_25

A. Klapper and M. Goresky, 2-Adic shift registers, Fast Software Encryption -FSE'93, pp.174-178, 1993.
DOI : 10.1007/3-540-58108-1_21

A. Klapper and M. Goresky, Cryptanalysis Based on 2-Adic Rational Approximation, Advances in Cryptology - CRYPTO'95, pp.262-273, 1995.
DOI : 10.1007/3-540-44750-4_21

A. Klapper and M. Goresky, Large Period Nearly deBruijn FCSR Sequences, Advances in Cryptology -EUROCRYPT'95, pp.263-273, 1995.
DOI : 10.1007/3-540-49264-X_21

A. Klapper and M. Goresky, Feedback shift registers, 2-adic span, and combiners with memory, Journal of Cryptology, vol.25, issue.2, pp.111-147, 1997.
DOI : 10.1007/s001459900024

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Klapper, Feedback with carry shift registers over finite fields, Fast Software Encryption -FSE'94, pp.170-178, 1994.
DOI : 10.1007/3-540-60590-8_14

A. Klapper, Distributional properties of d-FCSR sequences, Journal of Complexity, vol.20, issue.2-3, pp.305-317, 2004.
DOI : 10.1016/j.jco.2003.08.016

A. Klapper, Expected ??-Adic Security Measures of Sequences, Sequences and Their Applications -SETA, pp.219-229, 2008.
DOI : 10.1007/978-3-540-85912-3_20

E. Donald and . Knuth, The Art of Computer Programming, Volume II: Seminumerical Algorithms, 1981.

F. Valentin and . Kolchin, Random Mappings. Optimization Software, 1986.

J. Kelsey, B. Schneier, and N. Ferguson, Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator, Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, pp.13-33
DOI : 10.1007/3-540-46513-8_2

A. Klapper and J. Xu, Feedback with carry shift registers over Z/(n), Sequences and Their Applications -SETA'89, pp.379-392, 1989.

A. Klapper and J. Xu, Algebraic feedback shift registers, Theoretical Computer Science, vol.226, issue.1-2, pp.61-92, 1999.
DOI : 10.1016/S0304-3975(99)00066-3

A. Klapper and J. Xu, Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes, Designs, Codes and Cryptography, vol.31, issue.3, pp.227-250, 2004.
DOI : 10.1023/B:DESI.0000015886.71135.e1

[. Lacharme, Post-Processing Functions for a Biased Physical Random Number Generator, Fast Software Encryption -FSE 2008, pp.334-342, 2008.
DOI : 10.1007/978-3-540-71039-4_21

A. Lempel and W. L. Eastman, High Speed Generation of Maximal Length Sequences, IEEE Transactions on Computers, vol.20, issue.2, pp.227-229, 1971.
DOI : 10.1109/T-C.1971.223220

L. Pierre and . Ecuyer, Uniform random number generators, WSC '98: Proceedings of the 30th conference on Winter simulation, pp.97-104, 1998.

[. Lauradoux and A. Röck, Parallel Generation of ???-Sequences, Sequences and Their Applications -SETA 2008, pp.299-312, 2008.
DOI : 10.1007/978-3-540-85912-3_27

G. Marsaglia, Yet another RNG. Posted to electronic bulletin board sci, stat.math, 1994.

G. Marsaglia, Diehard battery of tests of randomness Available from http, 1995.

J. L. Massey, Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol.15, issue.1, pp.122-127, 1969.
DOI : 10.1109/TIT.1969.1054260

[. Matsui, Linear cryptoanalysis method for des cipher, EURO- CRYPT, pp.386-397, 1993.

M. Ueli and . Maurer, A universal statistical test for random bit generators, J. Cryptology, vol.5, issue.2, pp.89-105, 1992.

R. J. Mceliece, Finite field for scientists and engineers, 1987.

[. Matsumoto and T. Nishimura, Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator, ACM Transactions on Modeling and Computer Simulation, vol.8, issue.1, pp.3-30, 1998.
DOI : 10.1145/272991.272995

E. Gordon and . Moore, Cramming more components onto integrated circuits Available from http, Electronics, vol.38, issue.8, pp.114-117, 1965.

E. David, F. P. Muller, and . Preparata, Bounds to complexities of networks for sorting and switching, JACM, vol.22, pp.1531-1540, 1975.

L. James and R. A. Massey, Linear ciphers and random sequence generators with multiple clocks, Advances in Cryptology -EUROCRYPT'84, pp.74-87, 1984.

L. James and R. A. Massey, Method of, and apparatus for, transforming a digital data sequence into an encoded form, U. S. Patent Office US Patent, vol.4797, p.922, 1989.

W. Meier and O. Staffelbach, Fast correlation attacks on certain stream ciphers, Journal of Cryptology, vol.34, issue.3, pp.159-176, 1989.
DOI : 10.1007/BF02252874

R. Mut88-]-ljuben and . Mutafchiev, Limit theorem concerning random mapping patterns, Combinatorica, vol.8, issue.4, pp.345-356, 1988.

R. Mut89-]-ljuben and . Mutafchiev, The limit distribution of the number of nodes in low strata of a random mapping, Statist. Prabab. Lett, vol.7, issue.3, pp.247-251, 1989.

A. J. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, pp.0-8493, 1996.
DOI : 10.1201/9781439821916

G. Marsaglia and A. Zaman, A New Class of Random Number Generators, The Annals of Applied Probability, vol.1, issue.3, pp.462-480, 1991.
DOI : 10.1214/aoap/1177005878

. Nes and . Nessie, New European Schemes for Signatures, Integrity, and Encryption

H. Niederreiter, Random number generation and quasi-Monte Carlo methods, Society for Industrial and Applied Mathematics, 1992.
DOI : 10.1137/1.9781611970081

[. Nyberg and J. Wallén, Improved Linear Distinguishers for SNOW 2.0, Fast Software Encryption -FSE 2006, pp.144-162, 2006.
DOI : 10.1007/11799313_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Preneel, NESSIE Project, Encyclopedia of Cryptography and Security, 2005.
DOI : 10.1007/0-387-23483-7_271

W. Paul, J. H. Purdom, and . Williams, Cycle length in a random function. Transactions of the, pp.547-551, 1968.

[. Quisquater and J. Delescaille, Other Cycling Tests for DES, Advances in Cryptology -CRYPTO'87, pp.255-256, 1988.
DOI : 10.1007/3-540-48184-2_23

[. Quisquater and J. Delescaille, How easy is collision search. New results and applications to DES, Advances in Cryptology -CRYPTO'89, pp.408-413, 1989.
DOI : 10.1007/0-387-34805-0_38

A. Röck, Attaques par collision basées sur la perte d'entropie causée par des fonctions aléatoires, MajecSTIC, pp.115-124, 2007.

A. Röck, The impact of entropy loss caused by random functions, Western European Workshop on Research in Cryptology, pp.130-135, 2007.

A. Röck, Entropy of the Internal State of an FCSR in Galois Representation, Lecture Notes in Computer Science, vol.5086, pp.343-362, 2008.
DOI : 10.1007/978-3-540-71039-4_22

A. Röck, Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State, Lecture Notes in Computer Science, vol.5023, pp.258-275, 2008.
DOI : 10.1007/978-3-540-68164-9_18

A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication, pp.800-822, 2001.
DOI : 10.6028/NIST.SP.800-22

A. Rainer, Analysis and design of stream ciphers, 1986.

J. M. Ben, W. G. Smeets, and . Chambers, Windmill generators: A generalization and an observation of how many there are, Advances in Cryptology -EUROCRYPT'88, pp.325-330, 1988.

B. Schneier, Applied cryptography): protocols, algorithms, and source code in C, 1995.

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

A. Shamir, Stream Ciphers: Dead or Alive?, Advances in Cryptology -ASIACRYPT 2004, p.78, 2004.
DOI : 10.1007/978-3-540-30539-2_6

T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.), IEEE Transactions on Information Theory, vol.30, issue.5, pp.776-780, 1984.
DOI : 10.1109/TIT.1984.1056949

N. Sendrier and A. Seznec, HArdware Volatile Entropy Gathering and Expansion: generating unpredictable random numbers at user level, 2002.

A. Seznec and N. Sendrier, HAVEGE, ACM Transactions on Modeling and Computer Simulation, vol.13, issue.4, pp.334-346, 2003.
DOI : 10.1145/945511.945516

G. Schmidt and V. Sidorenko, Linear shift-register synthesis for multiple sequences of varying length, IEEE International Symposium on Information Theory -ISIT 2006, pp.1738-1742, 2006.

]. V. Ste69 and . Stepanov, Limit distributions of certain characteristics of random mappings . Theory of Probability and its Applications, 1969.

K. Suzuki, D. Tonien, K. Kurosawa, and K. Toyota, Birthday Paradox for Multi-collisions, Information Security and Cryptology ? ICISC 2006, Proceedings, pp.29-40, 2006.
DOI : 10.1007/11927587_5

C. E. Shannon and W. Weaver, The Mathematical Theory of Communication, 1949.

[. Turan, Ç. Çalik, N. Saran, and A. Doganaksoy, New Distinguishers Based on Random Mappings against Stream Ciphers, Sequences and Their Applications -SETA 2008, pp.30-41, 2008.
DOI : 10.1007/978-3-540-85912-3_3

M. Tribus and E. C. Mcirvine, Energy and Information, Scientific American, vol.225, issue.3, pp.179-188, 1971.
DOI : 10.1038/scientificamerican0971-179

[. Tian and W. Qi, -Sequences, SIAM Journal on Discrete Mathematics, vol.23, issue.2, pp.805-821, 2009.
DOI : 10.1137/080721200

URL : https://hal.archives-ouvertes.fr/hal-00807357

J. Walker, ENT a pseudorandom number sequence test program Available from http, 1998.

J. Walker, HotBits: Genuine random numbers, generated by radioactive decay, september, 2006.

[. Wegenkittl, Generalized ?-Divergence and Frequency Analysis in Markov Chains, 1998.

S. Wegenkittl, Entropy estimators and serial tests for ergodic chains, IEEE Transactions on Information Theory, vol.47, issue.6, pp.2480-2489, 2001.
DOI : 10.1109/18.945259

H. Wu, The Stream Cipher HC-128, New Stream Cipher Designs, pp.39-47, 2008.
DOI : 10.1007/978-3-540-68351-3_4

H. Xu and W. Qi, Further Results on the Distinctness of Decimations of<tex>$l$</tex>-Sequences, IEEE Transactions on Information Theory, vol.52, issue.8, pp.3831-3836, 2006.
DOI : 10.1109/TIT.2006.878181

N. Zierler, Linear Recurring Sequences, Journal of the Society for Industrial and Applied Mathematics, vol.7, issue.1, pp.31-48, 1959.
DOI : 10.1137/0107003

B. Zhang, H. Wu, D. Feng, F. Bao, and .. , Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers, Progress in Cryptology -INDOCRYPT 2004 List of Figures 1.1 Statue of Claude E, pp.73-83, 2004.
DOI : 10.1007/978-3-540-30556-9_7

L. Fibonacci, Multiple steps generator for a, p.150

L. Galois, Multiple steps generator for a, p.151

F. Fibonacci, Multiple steps generator for a, p.154

F. Galois, Multiple steps generator for a, p.156