1. Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for key management – part 1: general (revision 3), National Institute of Standards and Technology Special Publication 800-57 (2012)
2. Menezes, A., Vanstone, S., Van Oorschot, P.: Handbook of Applied Cryptography. CRC Press (1996)
3. Stinson, D.R.: Cryptography, Theory and Practice. CRC Press (1995)
4. Stokłosa, J., Bilski, T., Pankowski, T.: Data Security in Informatical Systems (in Polish). PWN (2001)
5. Lecture Notes in Computer Science;AB Klimov,2002