1. Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners. NewYork: Springer.
2. Greene, D. H., & Knuth, D. E. (2007). Mathematics for the analysis of algorithms. NewYork: Springer.
3. Sarfraz, M., Hussain, I., Ali, F., & Rasheed, A. (2016). A mobius transformation based algorithm for the construction of cryptographically strong 131028 S-boxes having highly nonlinear. International Journal of Computer Science and Information Security, 14(5), 611.
4. Ahmad, M., Haleem, H., & Khan, P. M. (2014). A new chaotic substitution box design for block ciphers. In 2014 International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 255–258). IEEE.
5. Han, J. S., Kim, H. S., & Neggers, J. (2012). On Fibonacci functions with Fibonacci numbers. Advances in Difference Equations, 2012(1), 126.