[1] W. Stallings, Cryptography and Network Security, Fourth Edition, Prentice Hall, 2006.
[2] W. Stallings, Network Security Essential, Second Edition, Prentice Hall, 2003.
[4] Kippenhahn, Rudolf. Code Breaking: A History and Exploration. The Overlook Press. Woodstock and New York. 1999.
[5] B. Sadehiyan, A. Ghaemi, "Finding suitable Differetial characteristics for block ciphers with ant colony technique", IEEE computer communication, ISCC'04, July 2004.
[6] D. Mills, "Autokey version 2 protocol", university of Delaeare, Jan., 2003.
[7] S. Landau:"Standing the test of time : The data encryption standards," Notices of the AMS, 342-349, March 2000.
[8] M. Burton, "Securing wireless 802.11 networks", Cirond Technology Inc., April 2003.