[1] B. Schneier, “Applied cryptography”, second edition, NY: John Wiley & Sons, Inc., (1996).
[2] J. G. Proakis, D. G. Manolakis, “Introduction to Digital Signal Processing”, MacMillan Publishing Company, (1988).
[3] L. Scripcariu, S. Ciornei, “Improving the Encryption Algorithms Using Multidimensional Data Structures”, Proceedings of the Third European Conference on the Use of Modern Information and Communication Technologies, ECUMICT 2008, Gent (Belgium), March (2008): 375-384.
[4] http://phys.org/news/2011-08-world-toughest-encryption-scheme-vulnerable.html.
[5] www.tutorialpoints.com.
[6] B. D. Hahn, D. T. Valentine, “Essential MATLAB for Engineers and Scientists, 4e”, Academic Press, (2010).
[7] L. Scripcariu, A. Alistar, M. D. Frunza, “JAVA Implemented Encryption Algorithm”, Proceedings of the 8th Int. Conference "Development and Application Systems", Suceava, DAS 2006, (2006) May: 424-429.
[8] U.S. Department of Commerce/NIST, ―Data Encryption Standard,‖ FIPS PUB 46-3, (1999) October: 1-26.
[9] NIST, ―Advanced Encryption Standard,‖ FIPS PUB 197, (2001) November: 1-51.
[10] J. Daemen and V. Rijmen, “The Design of Rijndael: AES - The Advanced Encryption Standard”, Springer-Verlag, Berlin Heidelberg, (2002).
[11] H. Gilbert and M. Minier, “A collision attack on seven rounds of Rijndael”, Proceedings of the 3rd AES Candidate Conference, (2000) April: 230-241.
[12] B. Schneier, “The GOST Encryption Algorithm”, Dr. Dobb’s Journal, v.20, n. 1, (1995) January: 123-124.
[13] D. J. Wheeler and R. Needham, “TEA, A Tiny Encryption Algorithm”, Technical Report 355, “Two Cryptographic Notes,” Computer Laboratory, University of Cambridge, (1994) December: 1-3.
[14] B. Yee, “Using Secure Coprocessor”, Ph. D. Dissertation, School of Computer Science, Carnegie University, (1994) May.