1. D. Andelman and J. Reeds, On the cryptanalysis of rotor machines and substitution-permutation networks, IEEE Transactions on Information Theory, 28 (1982), 578–584.
2. F. Ayoub, Trapdoors, random structures, and encryption functions design, Paper presented at the IEE Colloquium on Techniques and Implications of Digital Privacy and Authentication Systems, London, 1981.
3. F. Ayoub, Probabilistic completeness of substitution-permutation encryption networks, Proceedings of the IEE (Part E), 129 (1982), 195–199.
4. M. Beale and M. F. Monaghan, Encryption using random Boolean functions, in: Proceedings of the IMA Conference on Cryptography and Coding, Cirencester, December1986, Oxford University Press, Oxford, 1989, pp. 219–230.
5. H. J. Beker and F. C. Piper, Cipher Systems, Van Nostrand, Wokingham, 1982.