1. GOST 28147-89. Cryptographic protection for data processing systems, 1980. White paper, available from http://www.cisco.com/warp/public/732/netflow
2. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Proceedings of CRYPTO, pp. 1 – 18, November 2001
3. Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997
4. Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: Broucek, V. (ed.) Proceedings of the 14th EICAR Conference, pp. 201–217, May 2005
5. Filiol, E.: Techniques virales avancées. Springer, France (2006). An English translation is pending and will be in print at the beginning of 2007