1. Anderson, R.J.: Security engineering - a guide to building dependable distributed systems, 2nd edn. Wiley (2008)
2. Bauer, F.L.: Decrypted Secrets: Methods and Maxims of Cryptology, 4th edn. Springer Publishing Company, Incorporated (2010)
3. Bell, E.T.: Exponential polynomials. Annals of Mathematics 35(2), 258–277 (1934)
4. Bell, E.T.: The iterated exponential integers. Annals of Mathematics 39(3), 539–557 (1938)
5. Eckler, A.R.: Pangram variations. Word Ways 10(1), 17 (1977)