1. GOST (State Standard) 34.003–90: Information Technology, Moscow: Standartinform, 2009.
2. Petukhov, G.B. and Yakunin, V.I., Metodologicheskie osnovy vneshnego proektirovaniya tselenapravlennykh protsessov i tseleustremlennykh sistem (Methodological Foundations of External Design of Targeted Processes and Purposeful Systems), Moscow: AST, 2006.
3. Federal Law no. 149-FZ “On Information, Information Technologies, and Information Protection,” July 27, 2006.
4. Schneier, B., Applied Cryptography: Protocols, Algorithms and Source Code in C, Wiley, 2016, 2nd ed.
5. Menezes, A.J., Oorschot, P., and Vanstone, S., Handbook of Applied Cryptography, CRC Press, 2015.