1. Amann, B., Vallentin, M., Hall, S., Sommer, R.:Revisiting SSL: A large-scale study of the Internet’s mosttrusted protocol (2012).
http://www.icsi.berkeley.edu/pubs/techreports/ICSI_TR-12-015.pdf
2. Ball, J., Borger, J., Greenwald, G.: Revealed: how US and UK spy agencies defeat internet privacy andsecurity. The Guardian, 5 September 2013.
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
3. Barker, E.: Letter to Bruce Schneier (2007).
https://github.com/matthewdgreen/nistfoia/blob/master/6.4.2014%20production/109%20-%20Nov%2028%2020d07%20Letter%20to%20Bruce%20from%20Barker%20-%20Wired%d20Commentary%20.pdf
4. Bernstein, D., Heninger, N., Lange, T.: The year in crypto, 2013. In: Presentation at 30th Chaos Communication Congress.
https://hyperelliptic.org/tanja/vortraege/talk-30C3.pdf
5. Bernstein, D.J., Lange, T., Niederhagen, R.: Certicom’s patent applications regarding Dual EC key escrow (2014).
https://projectbullrun.org/dual-ec/patent.html