1. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley (2007)
2. Stinson, D.R., Paterson, M.B.: Cryptography: Theory and Practice, 4th edn (2019)
3. Mitrokotsa, A., Beye, M., Peris-Lopez, P.: Classification of RFID Threats based on Security Principles. Security Lab, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology (2011)
4. Vaudenay, S.: Sound proof of proximity of knowledge. In: Au, M.-H., Miyaji, A. (eds.) Provable Security, pp. 105–126. Springer, Cham (2015)
5. ISO/IEC 29167-10 Information technology—automatic identification and data capture techniques—part 10: Crypto suite AES-128 security services for air interface communications (2017)