1. Kam, J.B., and Davida, G.I.: Structured Design of Substitution-Permutation Encryption Networks. IEEE Transactions on Computers, Vol. 28, No. 10, 747 (1979)
2. Feistel, H.: Cryptography and Computer Privacy. Scientific American, Vol. 228, No. 5, 15 (1973)
3. Konheim, A.G.: Cryptography: a Primer. John Wiley and Sons, New York (1981)
4. Webster, A.F.: Plaintext/Ciphertext Bit Dependencies in Cryptographic Algorithms. M.Sc. thesis, Queen’s University at Kingston (1985)
5. National Bureau of Standards: Data Encryption Standard. FIPS Publication
46, Washington, D.C. (1977)