1. Java Cryptography Architecture (JCA) Reference Guide, https://docs.oracle.com/javase/8/docs/technotes/guides/security/crypto/CryptoSpec.html#Design.
2. Java Downloads, https://www.oracle.com/java/technologies/downloads/#java17.
3. J. Daemen and V. Rijmen, ‘AES proposal: Rijndael’, 1999, Accessed: Mar. 30, 2024. [Online]. Available: https://www.cs.miami.edu/home/burt/learning/Csc688.012/rijndael/rijndael_doc_V2.pdf
4. R. L. Rivest, A. Shamir, and L. Adleman, ‘A method for obtaining digital signatures and public-key cryptosystems’, Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978, doi: 10.1145/359340.359342.
5. A. Mittelbach and M. Fischlin, The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography. in Information Security and Cryptography. Cham: Springer International Publishing, 2021.