1. Bond M (2000) A chosen key difference attack on control vectors.
http://www.cl.cam.ac.uk/~mkb23/research/CVDif.pdf
. Accessed Nov 2000
2. Matyas SM (1991) Key handling with control vectors. IBM Syst J 30(2):151–174
3. Menezes AJ, van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton
4. Stallings W (2010) Cryptography and network security – principles and practice, 3rd edn. Prentice Hall, Upper saddle River
5. http://www.cl.cam.ac.uk/mkb23/research/CVDif-Response.pdf