1. Th. Beth, D. Jungnickel, and H. Lenz,Design Theory, Bibliographisches Institut, Zurich, 1985.
2. E. F. Brickell, A few results in message authentication,Congr. Numer.
43 (1984), 141–154.
3. Lecture Notes in Computer Science;E. F. Brickell,1988
4. G. Castagnoli, Comments on Massey's concepts of perfect secrecy and perfect authenticity,Alta Frequenza
51 (1987), 227–228.
5. Lecture Notes in Computer Science;M. Soete De,1988