1. Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)
2. Stinson, D.R.: Cryptography: Theory and Practice. CRC Press (2005)
3. Wood, C.A.: Large substitution boxes with efficient combinational implementations, M.S. thesis, Rochester Institute of Technology (2013)
4. Burnett, L.: Heuristic optimization of Boolean functions and substitution boxes for cryptography. Ph.D. dissertation, Queensland University of Technology (2005)
5. Nedjah, N., Mourelle, L.D.M.: Designing substitution boxes for secure ciphers. Int. J. Innov. Comput. Appl. 1(1), 86–91 (2007)