1. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
2. Koblitz N (1997) Elliptic curve cryptosystems
3. Menezes A, Van Oorschot P, Vanstone S (1997) Handbook of applied cryptography, 1st edn. CRC Press, Boca Raton
4. Schneier B (1996) Applied cryptography, 2nd edn. Wiley, ISBN: 0471128457
5. Rueppel RA (1992) Stream ciphers. In: The science of information integrity. IEEE press, New York