1. H. Beker and F. Piper, Cipher systems: the protection of communications, New York, NY: Van Nostrand, 1982.
2. E.R. Berlekamp, R.J. McEliece and H.C.A. van Tilborg, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, vol. 24, pp. 384–386, 1978.
3. R.E. Blahut, Theory and practice of error control codes, Reading, MA: Addison-Wesley, 1984.
4. E. Biham and A. Shamir, Differential analysis of DES-like cryptosystems, presented at CRYPTO’90 (to appear in the proceedings).
5. D.E.R. Denning, Cryptography and data security, Reading, MA: Addison-Wesley, 1982.