1. CERT® advisory CA-2003-26: Multiple vulnerabilities in SSL/TLS implementations (October 2003),
http://www.cert.org/advisories/CA-2003-26.html
2. Jif source code for the mental poker protocol (March 2005),
http://www.cs.chalmers.se/~aaskarov/jifpoker
3. Agat, J.: Transforming out timing leaks. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 40–53 (January 2000)
4. Anderson, R.: Why cryptosystems fail. In: ACM Conference on Computer and Communications Security, pp. 215–227 (November 1993)
5. Banerjee, A., Naumann, D.A.: Secure information flow and pointer confinement in a Java-like language. In: Proc. IEEE Computer Security Foundations Workshop, pp. 253–267 (June 2002)