[1]
‘My Bookmarks | University College London’. [Online]. Available: http://readinglists.ucl.ac.uk/users/68FBE472-1695-6D06-25E8-F8CE72594AC2/bookmarks.html
[2]
Alfred J. Menezes, Handbook of applied cryptography. Boca Raton: CRC Press, 1997.
[3]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of applied cryptography. CRC [Online]. Available: http://cacr.uwaterloo.ca/hac/
[4]
R. Anderson, Security engineering: a guide to building dependable distributed systems, 2nd ed. Indianapolis: Wiley, 2008 [Online]. Available: http://www.vlebooks.com/vleweb/product/openreader?id=UCL&isbn=9781118008386
[5]
‘Online cryptanalysis teaching and software resources’. [Online]. Available: http://blog.bettercrypto.com/?page_id=1368
[6]
A. Joux, Algorithmic cryptanalysis, vol. Chapman&Hall/CRC cryptography and network security. Boca Raton: CRC Press, 2009.
[7]
‘Online cryptanalysis teaching and software resources’. [Online]. Available: http://blog.bettercrypto.com/?page_id=1368