1. References
2. Shnayyer, B. (2002), “Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnyye teksty na yazyke Si” [Applied cryptography. Protocols, algorithms, source texts in C language], TRIUMF, Moscow, 816 p.
3. (2004), Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity,and Encryption, Version 0.15 (beta), Springer-Verlag, 829 p.
4. Landau, S. (2004), Polynomials in the Nation’s Service: Using Algebra to Design the Advanced Encryption Standard, The mathematical association of America, No. 111, pp. 89-117.
5. Aung, T.M. (2007), “Razrabotka y yssledovanye stokhastycheskykh metodov zashhyty proghrammnykh system” [Development and research of stochastic methods for protecting software systems], Abstract of Ph.D. dissertation, 05.13.11, 05.13.19, Moscow State University, Engineering and Physics Institute, Moscow, Russia.