1. S. Herbert, "A brief History of Cryptography", An article available at hhtp://cybercrimes.net/aindex.html.
2. B. Reddaiah, R. Pradeep kumar Reddy, S. Hari Krishna, "Enciphering using Bit-wise logical operators and pairing function with text generated hidden key", IJCA 90975-88870, vol. 121, No. 8, July 2015: pp. 30-35. https://doi.org/10.5120/21562-4597
3. S. Tanenbaum, "Modern Operating Systems", Prentice Hall, 2003.
4. Basic Cryptographic Algorithms", an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro.html#Alogrithms.
5. P.P. Charles & P. L. Shari, "Security in Computing: 4th edition", Prentice-Hall, Inc., 2008.