1. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
2. McGrew, D.A., Viega, J.: The Galois/Counter mode of operation (GCM) (May 2005),
http://www.mindspring.com/~dmcgrew/gcm-nist-6.pdf
3. International Organization for Standardization Genève, Switzerland: ISO/IEC 19772:2009, Information technology — Security techniques — Authenticated encryption mechanisms (February 2009)
4. International Organization for Standardization Genève, Switzerland: ISO/IEC 9797-3:2011, Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function (2011)
5. Dent, A.W., Mitchell, C.J.: User’s Guide to Cryptography and Standards. Artech House (2005)