1. Anvin, H.P.: The mathematics of RAID-6,
http://www.kernel.org/pub/linux/kernel/people/hpa/raid6.pdf
2. Lecture Notes in Computer Science;D.J. Bernstein,2008
3. Brickell, E., Graunke, G., Neve, M., Seifert, J.P.: Software mitigations to hedge AES against cache based software side channel vulnerabilties, IACR ePrint Archive, Report 2006/052 (2006),
http://eprint.iacr.org/2006/052.pdf
4. Gladman, B.: Implementations of AES (Rijndael) in C/C++ and assembler,
http://www.gladman.me.uk/cryptography_technology/rijndael
5. Gueron, S., Kounavis, M.E.: Carry-Less Multiplication and Its Usage for Computing the GCM Mode,
http://softwarecommunity.intel.com/isn/downloads/intelavx/Carry-Less-Multiplication-and-The-1.GCM-Mode_WP%20.pdf