1. BOINC: Berkeley Open Infrastructure for Network Computing, http://boinc.berkeley.edu/
2. Lecture Notes in Computer Science;S. Al-Hinai,2006
3. Alon, N., Semour, P., Thomas, R.: A separator theorem for graphs with an excluded minor and its applications. Journal of the American Mathematical Society 3(4), 801–808 (1990)
4. Arditti, D., Berbain, C., Billet, O., Gilbert, H., Patarin, J.: QUAD: Overview and recent developments. In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography. Dagstuhl Seminar Proceedings, vol. 07021. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany (2007)
5. Bard, G.V.: Algorithms for solving linear and polynomial systems of equations over finite fields with applications to cryptanalysis. Ph.D. thesis, Department of Applied Mathematics and Scientific Computation, University of Maryland, College Park (August 2007), http://www.math.umd.edu/~bardg/bard_thesis.pdf