1. C. M. Adams and S. E. Tavares, A Note on the Generation and Counting of Bent Sequences, tech. rep., Department of Electrical Engineering, Queens’s University, July 1989 (submitted to IEEE Transactions on Information Theory).
2. —, The Structured Design of Cryptographically Good S-Boxes, tech. rep., Department of Electrical Engineering, Queens’s University, Mar. 1989 (submitted to the Journal of Cryptology).
3. D. K. Branstad, J. Gait, and S. Katzke, Report of the workshop on cryptography in support of computer security, Tech. Rep. NBSIR 77-1291, National Bureau of Standards, Sept 1976.
4. E. F. Brickell, J. H. Moore, and M. R. Purtill, Structure in the S-boxes of the DES (extended abstract), in Advances in Cryptology: Proc. of CRYPTO’ 86, Springer-Verlag, Berlin, 1987, pp. 3–8.
5. H. Feistel, W. Notz, and J. L. Smith, Some Cryptographic Techniques for Machine-to-Machine Data Communications, Proceedings of the IEEE, 63 (1975), pp. 1545–1554.