1. F. J. MacWilliams and N. J. A. Sloane, Introduction to Coding Theory (Elsevir, North-Holland, Amsterdam, New York, Oxford, 1977) p. 785.
2. V. S. Pless, W. C. Huffman, and R. Brualdi, eds., Handbook of Coding Theory (North-Holland, Netherlands, 1998) p. 3439.
3. A. J. Menezes, P. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography (CRC Press, Netherlands, 1996) p. 816.
4. H. C. A. van Tilborg, An Introduction to Cryptology (Kluwer Academic Publishers, Netherlands, 1988) p. 816.
5. H. Niederreiter, Problems of Control and Information Theory 15, 159–166 (1986).