1. Bellezza, A.: Countermeasures against side-channel attacks for elliptic curve cryptosystems. In: Cryptology ePrint Archive, 2001/103 (2001). http://citeseer.ist.psu.edu/bellezza01countermeasures.html . Accessed 14 Sept 2014
2. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski B.S. Jr. (ed.) CRYPTO’97, 17th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, August 1997, pp. 513–525. Lecture Notes in Computer Science, No 1294. Springer, Heidelberg, (1997)
3. Convention on Cybercrime CETS No 185 The Cybercrime Convention Committee (T-CY), Strasbourg (2001). http://conventions.coe.int/Treaty/en/Treaties/html/185.htm . Accessed 14 Sept 2014
4. Corner, D.E., Stevens, D.L.: Internetworking with TCP/IP, Vol III: Client-Server Programming and Applications. Prentice Hall, Upper Saddle River, NJ (2000)
5. Gorbenko, I.D., Gorbenko, Y.I.: Prykladna kryptologia (Applied Cryptology). Fort, Kharkiv (2012)