1. Schneier, B. Applied Cryptography. Protocols, algorithms, source texts in C language [Text] / B. Schneier. - M .: Triumph, 2002. - 816 p. — ISBN 5-89392-055-4.
2. Fomichev, V. M. Methods of discrete mathematics in cryptology [Text] / V. M. Fomichev. - M.: DIALOG-MEPhI, 2010. - 424 p. - ISBN 978-5-86404-234-2.
3. Mao, V. Modern cryptography. Theory and practice [Text] / V. Mao . — M.: Williams, 2005. — 786 p. — ISBN 5-8459-0847-7.
4. Popescu, A., Constantinescu, D. Kleinrock Independence assumption. Lecture Notes In Computer Science, Network Performance Engineering (pp.1-13), DOI:10.1007/978-3-642-02742-0_1.
5. Arkhangelskaya, A. V. Characteristics of the area of effective application of stream encryption methods for protecting traffic in telecommunication systems [Text] / A. V. Arkhangelskaya, S. V. Zapechnikov // Information counteraction to terrorism threats. - 2005. - No. 4. - S. 183-186.