1. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley & Sons, 1996.
2. J. P. Gray and T. A. Kean, “Configurable Hardware: A New Paradigm for Computation,” presented at Decennial Cal Tech Conference on VLSI, Pasadena, CA, 1989.
3. M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener, “Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security: A Report by an ad hoc Group of Cryptographers and Computer Scientists,” http://www.bsa.org/policy/eneryption/cryptographers, 1996.
4. I. Goldberg and D. Wagner, “Architectural Considerations for Cryptoanalytic Hardware,” http://www.cs.berkeley.edu/-iang/isaac/hardware, 1996.
5. S. Son, “Feasibility Study: DES Cryptanalysis Using Reconfigurable Hardware,” ftp://ftp.et.byu.edu/papers/ desfpga.ps, 1996.