1. Z. Chao, New Directions of Modern Cryptography, 2012 by Taylor & Francis Group, LLC.
2. J. J. Climent, P. R. Navarro and L. Tortosa, (2012), Key exchange protocols over non-commutative rings, The case of END(Zp × Zp2), AMS.
3. D. Coppersmith, Weakness in quaternion signatures, Crypto’99, LNCS 1666, 1999.
4. Y. Hashimoto and K. Sakurai, On construction of signature schemes based on birational permutations over non-commutative rings, Institute of Systems and Information Technologies, Japan, 2008.
5. A. A. Kamal, A. M. Youssef, (2012), Cryptanalysis of a key exchage protocol based on the endomor-phisms ring END(Zp × Zp2), Springer-Verlag.