1. ASA, "Electronics Funds Transfer — Requirements for Interfaces, Part 5, Data Encryption Algorithm," AS2805.5-1985, Standards Association of Australia, Sydney, Australia, 1985.
2. L. Brown, "A Proposed Design for an Extended DES" in Proc. Fifth International Conference and Exhibition on Computer Security, IFIP, Gold Coast, Queensland, Australia, 19–21 May, 1988.
3. L. Brown and J. Seberry, "On the Design of Permutation P in DES Type Cryptosystems," in Abstracts of Eurocrypt 89, IACR, Houthalen, Belgium, 10–13 Apr., 1989.
4. M. Davio, Y. Desmedt, M. Fosseprez, R. Govaerts, J. Hulsbosch, P. Neutjens, P. Piret, J. Quisquater, J. Vanderwalle and P. Wouters, "Analytical Characteristics of the DES," in Advances in Cryptology — Proc. of Crypto 83, D. Chaum, R. L. Rivest and A. T. Sherman (editors), pp. 171–202, Plenum Press, New York, Aug. 22–24, 1983.
5. E. K. Grossman and B. Tuckerman, "Analysis of a Weakened Feistel-Like Cipher," in Proc. 1978 IEEE Conf. On Communications, pp. 46.3.1-5, IEEE, 1978.