1. Asanovic K, Bodik R, Catanzaro BC, Gebis JJ, Husbands P, Keutzer K, Patterson DA, Plishker WL, Shalf J, Williams SW et al (2006) The landscape of parallel computing research: a view from berkeley, Technical report UCB/EECS-2006-183, EECS Department. University of California. Technical Report, Berkeley
2. Dubey P, Engineer S (2006) Teraflops for the masses: killer apps of tomorrow. In: Workshop on edge computing using new commodity architectures, UNC, vol 23
3. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, USA
4. U. D. o. C. National Bureau of Standards, “Data Encryption Standard (DES)” (1977).
https://csrc.nist.gov/csrc/media/publications/fips/46/3/archive/1999-10-25/documents/fips46-3.pdf
5. NIST “Advanced Encryption Standard (AES),” National Institute of Standards and Technology (NIST) (2001)