1. Corman, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. McGraw-Hill
2. Yamuna, M., Gogia, M., Sikka, A., Khan, M.J.H.: Encryption using graph theory and linear algebra. Int. J. Comput. Appl. (2012). ISSN: 2250-1797
3. Ustimenko, V.A.: On graph-based cryptography and symbolic computations. Serdica J. Comput. 131–156 (2007)
4. Paszkiewicz, A., et al.: Proposals of graph based ciphers, theory and implementations. ResearchGate
5. Lu, S., Ostrovsky, R., Manchala, D.: Visual cryptography on graphs. In: CiteSeerx, COCOON, p. 225 (2008)