1. Aczél, J.: Lectures on functional equations and their applications. Academic Press 1966.
2. Brawley, J. V., Carlitz, L.: A characterization of the n×n matrices over a finite field. Amer. Math. Monthly80, 670–672 (1973).
3. Diffie, W., Hellman, M. E.: New directions in cryptography, IEEE Trans. Inf. Theory IT-22, 644–654 (1976).
4. Ecker, A.: Comment on the note: “The congruencea r+s ≡a r (modm)” by A. E. Livingston and M. L. Livingston. Amer. Math. Monthly87, 811–814 (1980).
5. Engel, A.: Datenschutz durch Chiffrieren: Mathematische und algorithmische Aspekte. MU6, 30–51 (1979).