[1]Lai Xuejia. On the Design and Security of Block Ciphers[M]. Konstanz: HartungGorre Velag, 1992[2]Ekdahl P, Johansson T. A new version of the stream cipher snow[C] Proc of Selected Areas in Cryptography—SAC 2002. Berlin: Springer, 2002: 4761[3]Doug W, Bruce S, Stefan L, et al. Helix: Fasten encryption and authentication in a single cryptographic primitive[C] Proc of Fast Software Encryption 2003. Berlin: Springer, 2003: 330347 [4]Biham E, Seberry J, Neito G. Py(Roo): A fast and secure stream cipher using rolling arrays[OL]. ESTREAM, ECRYT Stream Cipher Project, 2005023, 2005 [20051201]. http:www.ecrypt.eu.orgstream[5]郭建胜, 金晨辉. 逐位模2加运算与模2n加运算的相容程度分析[J]. 高校应用数学学报: A辑, 2003, 18(2): 247250 [6]关杰, 金晨辉, 常亚勤. 模2n加与模2加相对结合律相容程度的分析[J]. 国防科技大学学报, 2012, 34(2): 4245[7]陈士伟, 金晨辉, 李席斌.模2n加与模2加的相容程度分析及应用[J]. 北京邮电大学学报, 2010, 33(3): 4447[8]魏悦川, 潘晓中, 戎宜生, 等. 三元模2n加与三元模2加相容程度的分析[J]. 武汉大学学报:理学版, 2016, 62(2): 187190