1. T. Becker, V. Weispfenning., “Gröbner Bases.” Springer-Verlag, New York, (1993).
2. E. Biham., “A Fast New DES Implementation in Software,” FSE'97, LNCS 1267, pp. 245–251, (1997).
3. D. Branstead, J. Gait, S. Katzke., “Report of the workshop on cryptography in support of computer security,” National Bureau of Standards, Sept, 21–22 1976, NBSIR 77-1291, Sept. (1977).
4. M. Davio, Y. Desmedt, M. Fosseprez, R. Govaerts, J. Hulsbosch, P. Neutjens, P. Piret,J. Quisiquater, J. Vandewall, P. Wouters., “Analytical charactersitics of the DES,” CRYPTO'83, (1984).
5. M. Hellman, R. Merkel, R. Schroeppel, L. Washington, W. Diffie, P. Schweiter., “Results of an initial attempt to cryptanalyze the NBS data encryptoion standard,” SEL 76-042, Stanford Univ. (1976).