1. Tuomas Aura. Invisible communication. In Proceedings of the HUT Seminar on Network Security '95, Espoo, Finland, November 1995. Telecommunications Software and Multimedia laboratory, Helsinki University of Technology.
2. Hannes Federrath and Jürgen Thees. Schutz der Vertraulichkeit des Aufenhaltsorts von Mobilfunkteilnehmern. Datenschutz und Datensicherung, (6):338–348, June 1995.
3. Maxwell T. Sandford II, Jonathan N. Bradley, and Theodore G. Handel. The data embedding method. In Proceedings of the SPIE Photonics East Conference, Philadelphia, September 1995.
4. Paul C. Kocher. Personal communication, October 1995.
5. Michael Luby and Charles Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373–386, April 1988.