1. Lecture Notes in Computer Science;E. Biham,1994
2. Black, J., Urtubia, H.: Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. In: Proc. of 11th USENIX Security Symposium. USENIX, pp. 327–338 (2002)
3. Lecture Notes in Computer Science;C.J. Mitchell,2005
4. National Bureau of Standards, DES Modes of Operation, FIPS-pub.46, National Bureau of Standards U.S Department of Commerce, Washington D.C (1980)
5. Lecture Notes in Computer Science;G. Paterson,2004