1. Robert B.Ash. Information Theory Dover, New York, 1965. 68, 69, 73, 73, 77
2. S.M. Bellovin and M. Merritt. Encrypted key exchange:Password-based protocols secure against dictionary attacks. In Proc. of the 1992 IEEE Comp. Soc. Symp. on Res. in Secur. and Priv. pages 72–84. IEEE Press, 1992. 71
3. Christian Cachin. Entropy Measures and Unconditional Security in Cryptography PhD thesis, ETH Zürich, 1997. 67
4. Thomas M.Cover and Joy A.Thomas. Elements of Information Theory John Wiley & Sons, New York, 1991. 68, 69, 73, 73, 73, 77, 77
5. Electronic Frontier Foundation.Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design O’Reilly & Associates, Sebastopol, CA, 1998. 71