1. Denning, D. E. R. (1983). Cryptography and data security. Reading: Addison-Wesley.
2. Rhee, M. Y. (1994). Cryptography and secure communications. Singapore: McGraw-Hill.
3. Menezes, A., Oorschot, P. V., & Vanstone, S. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.
4. Omura, J. K., & Massey, J. L. (1986). Computational method and apparatus for finite field arithmetic. U.S. Patent Number 4,587,627, May.
5. Reyhani-Masoleh, A., & Hasan, M. A. (2005). Low complexity word-level sequential normal basis multipliers. IEEE Trans Computers, 54(2), Feb.