1. Filiol E. The Control of Technology by Nation States: Past, Present and Future—The Case of Cryptology and Information Security II. In: RusCrypto'2014, Moscow, March 25-28th, 2014
2. Shumow D, Ferguson N. On the possibility of a back door in the nist sp800-90 dual ec prng. In: Proc. Crypto, vol. 7; 2007
3. Strehle R. Verschlüsselt: der Fall Hans Bühler. Werd; 1994
4. Fried J, Gaudry P, Heninger N, Thomé E. A kilobit hidden SNFs discrete logarithm computation. Cryptology ePrint Archive. Report 2016/961; 2016. http://eprint.iacr.org/2016/961
5. Biham E, Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Vol. 28. New York: Springer; 1993