1. P. T. Breuer, J.P. Bowen, A fully homomorphic crypto-processor design: Correctness of a secret computer, in: Proc. Intl. Symp. on Engineering Secure Software and Systems (ESSoS 2013), no. 7781 in Lecture Notes in Computer Science, Springer, Heidelberg, 2013, pp. 123-138. doi:10.1007/978-3-642-36563-8 9.
2. D. Molnar, T. Kohno, N. Sastry, D. Wagner, Tamper-evident, history-independent, subliminal-free data structures on prom storage -or- how to store ballots on a voting machine, in: Proc. 2006 IEEE Symposium on Security and Privacy, 2006, pp. 364-370. doi:10.1109/SP. 2006.39.
3. E. Palomar, Z. Liu, J.P. Bowen, Y. Zhang, S. Maharjan, Component-based modelling for sustainable and scalable smart meter networks, in: Proc. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014), 2014, pp. 1-6. doi:10.1109/WoWMoM. 2014.6918927.
4. P. T. Breuer, J.P. Bowen, Towards a working fully homomorphic crypto-processor: Practice and the secret computer, in: Proc. Intl. Symp. on Engineering Secure Software and Systems (ESSoS 2014), Vol. 8364 of Lecture Notes in Computer Science, Springer, Heidelberg, 2014, pp. 131-140. doi:10.1007/978-3-319-04897-0 9.
5. The Design of Rijndael: AES – The Advanced Encryption Standard;Daemen,2002