1. M. Borowski, R. Wicik, A one-time cipher machine for Polish Army, Military Communication Conference, Prague, 2008.
2. William Stallings, Cryptography and Network Security: Principles and Practices-3Ed -PHI
3. Stefan Lucks, Open key exchange: How to defeat dictionary attacks without encrypting public keys, Conference paper, First Online: 15 June 2005.
4. Cryptography for internet of things security;Bhatt;J. Electron. Sci. Technol.,2019
5. Ge Wuab, Fuchun Guob, Willy Susilo, Generalized public-key cryptography with tight security-Information Sciences Volume 504, December 2019.