1. IBM 4758 PCI Cryptographic Coprocessor, CCA Basic Services Reference And Guide, Release 1.31 for the IBM 4758-001
2. S.M. Matyas, ‘Key Handling with Control Vectors’, IBM Systems Journal v. 30 n. 2, 1991, p. 151–174
3. S.M. Matyas, A.V. Le, D.G. Abraham, ‘A Key Management Scheme Based on Control Vectors’, IBM Systems Journal v. 30 n. 2, 1991, pp. 175–191
4. IBM Comment on ‘A Chosen Key Difference Attack on Control Vectors’, Jan 2000
5. NSM Developers Manual, Computer Security Associates (Pty.) Ltd., July 1990