1. [1] U.S. Department of Commerce, National Bureau of Standards, Data Encryption Standard (Federal Information Processing Standards Publication 46), 1977.
2. [2] U.S. Department of Commerce, National Bureau of Standards, DES Modes of Operation (Federal Processing Standards Publication 81), 1980 ( https://csrc.nist.gov/publications/detail/fips/81/archive/1980-12-02, visited July 2, 2018).
3. [3] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, “A concrete security treatment of symmetric encryption,” 38th Annual Symposium on Foundations of Computer Science (FOCS 1997), pp.394-403, IEEE Computer Society, 1997. 10.1109/sfcs.1997.646128
4. [4] A.K. Lenstra, J.P. Hughes, M. Augier, J.W. Bos, T. Kleinjung, and C. Wachter, “Public keys,” Advances in Cryptology — CRYPTO 2012, R. Safavi-Naini and R. Canetti, eds., Lecture Notes in Computer Science, vol.7417, pp.626-642, Berlin, Heidelberg, Springer-Verlag, 2012. 10.1007/978-3-642-32009-5_37
5. [5] N. Heninger, Z. Durumeric, E. Wustrow, and J.A. Halderman, “Mining your Ps and Qs: Detection of widespread weak keys in network devices,” Proc. 21st USENIX Security Symposium, T. Kohno, ed., pp.205-220, USENIX, 2012 ( https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/heninger ).