1. Chefranov A. G., “Secure Hill Cipher Modification SHC-M” Proc. Of the First International Conference on Security of Information and Network (SIN2007) 7-10 May 2007, Gazimagusa (TRNC) North Cyprus, Elci, A., Ors, B., and Preneel, B (Eds) Trafford Publishing, Canada, 2008: pp 34-37, 2007.
2. Polynomial equations and circulant matrices”;Kalman;Amer. Math. Monthly,2001
3. Daniele Micciancio, Oded Regev. “Lattice-based Cryptography”. July 22 2008.
4. Cryptography in an Algebraic Alphabet;Hill LS;American Mathematical Monthly,1929
5. Concerning Certain Linear Transformation Apparatus of cryptography;Hill LS;American Mathematical Monthly,1931