1. Diffie , W. and M. Hellman . 1979 . Privacy and Authentication: An Introduction to Cryptography , Proceedings of the IEEE , March , pp. 397 – 427 .
2. Knudson , L. October 2000 . Block Chaining Modes of Operation . NIST First Modes of Operation Workshop , http://csrc.nist.gov/groups/ST/toolkit/BCM/workshops.html(Accessed 23 May 2009).
3. Lipmaa , H. , P. Rogaway , and D. Wagner . October 2000 . CTR Mode Encryption . NIST First Modes of Operation Workshop , http://csrc.nist.gov/groups/ST/toolkit/BCM/workshops.html(Accessed 23 May 2009).
4. National Institute of Standards and Technology . 2001 . Recommendation for Block Cipher Modes of Operation , NIST Special Publication , 800-38A .
5. Voydock , V. and S. Kent . June 1983 . Security Mechanisms in High-Level Network Protocols , Computing Surveys , pp. 135 – 171 .