1. Some cryptographic techniques for machine-to-machine data communications;Feistel;Proc. IEEE,1975
2. D.R. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Raton, FL, 1995.
3. J. Daemen, Cipher and Hash function design, Ph.D. Thesis, Katholieke Universiteit Leuven, March 1995.
4. On immunity against Biham and Shamir’s differential cryptanalysis;Adams;Inform. Process. Lett.,1992
5. Data Encryption Standard, Federal Information Processing Standards (FIPS) Publication No. 46, National Bureau of Standards, US Department of Commerce, Washington, DC, January 1977.