1 Shirey, R. Internet Security Glossary. RFC 2828, May 2000.
2 National Institute of Standards and Technology. Advanced Encryption Standard. FIPS PUB 197, November 26, 2001.
3 Stallings, W. Cryptography and Network Security
. Upper Saddle River, NJ: Prentice Hall
4 Robshaw, M. Stream Ciphers. RSA Laboratories Technical Report TR‐701, 1995.
5 Rivest, R, Shamir, A, Adleman, L. A method for obtaining digital signatures and public key cryptosystems. Commun ACM 1978, 21:120–126.
6 Singh, S. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
. New York: Anchor Books
7 Hellman, M. The mathematics of public‐key cryptography. Sci Am 1970, 241:146–157.
8 Diffie, W, Hellman, M. New directions in cryptography. IEEE Trans Inf Theor 1976, IT‐22:644–654.