1. Kamerstuk II 2004/2005, 25 764, nr. 26 (Official communication of the Dutch parliament)
2. Kamerstuk II, 2004/2005, 29 754, nr. 5 (Official communication of the Dutch parliament)
3. Yearly report on algorithms and keysizes (2005). Technical report, IST-2002-507932 ECRYPT, D.SPA.10 Rev. 2005-0.2 (January 2006)
4. Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: IEEE Security and Privacy, Oakland, CA, USA, pp. 72–84. IEEE, Los Alamitos (1992)
5. BSI. Advanced security mechanisms for machine readable travel documents – extended access control (eac). Technical Report TR-03110, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany (2006)