1. Dorothy, E., Denning, R.: Purdue University, Cryptography and Data Security. Addison-Wesley Publishing Company (1983)
2. Schneier, B.: Applied Cryptography, Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley (1996)
3. Atkins, D., Buis, P., Hare, C., Kelly, R., Nachenberg, C., Anthony Nelson, B., Phillips, P., Ritchey, T., Sheldon, T., Snyder, J.: Internet Security, Professional Reference. New Riders Publishing, Indianapolis (1997)
4. Charles, P.: Security in Computing. Prentice-Hall International Inc. (1989)
5. Brassard, G.: Lecture Notes in Computer Science, Modern Cryptology. In: Goos, G., Hartmanis, J. (eds.) (1988)