1. H. Beker, F. Piper, Cipher Systems, The protection of Communications, Northwood Books, London (1982).
2. C. E. Shannon, “Communication theory and secrecy systems,” Ben System Tech. J., vol. 28, pp. 636–715 (1949).
3. M. E. Hellman, “An extension of the Shannon theory approach to cryptography,” IEEE Trans. on Inform. Theory, vol. IT-23, pp. 289–294 (May 1977).
4. J. L. Massey, “On probabilistic encipherment,” 1987 EEE Information Theory Workshop, Bellagio (Italy).
5. D. Kahn, The Codebreakers, The Story of Secret Writing, Weidenfeld and Nicolson, London (1966).