1. Guiding the Security Protection of Key Information Infrastructure with a Scientific Network Security Concept;Li;J. Internet Things,2019
2. Cao, S., and Fan, L. (2022). NSA’s top backdoor has been exposed by Chinese researchers. Glob. Times.
3. Differential cryptanalysis of DES-like cryptosystems;Biham;J. Cryptol.,1991
4. Matsui, M. (1993, January 23–27). Linear Cryptanalysis Method for DES Cipher. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway.
5. Knudsen, L.R. (1992, January 13–16). Cryptanalysis of LOKI 91, Advances in Cryptology-Auscrypt 92, LNCS 718. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia.