1. AMD, Linux Kernel Issue with Systems Using AGP Graphics—Application Note, August 2002.
http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/26698.pdf
2. J. Appelbaum, J. Horchert, C. Stöcker, Shopping for Spy Gear: Catalog Advertises NSA Toolbox, Der Spiegel, 29 December 2013. Online edition:
http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
3. A.D. Balsa, The Cyrix 6x86 Coma Bug.
http://www.tux.org/~balsa/linux/cyrix/index.html
4. M. Bellare and P. Rogaway, Optimal Asymmetric Encryption—How to Encrypt with RSA (Extended Abstract), Advances in Cryptology, Proceedings of EUROCRYPT’94, LNCS 950 (Springer, Berlin, 1995), pp. 92–111
5. E. Biham, Y. Carmeli, A. Shamir, Bug attacks, in Advances in Cryptology, Proceedings of CRYPTO’08, LNCS 5157 (Springer, Berlin, 2008) pp. 221–240.