| Krishnamurty, Computer Cryptographic Techniques for Processing and Storage of Confidential Information, Int. J. Control, 1970.* |
| British General Staff, Manual of Cryptography, Aegean Park Press (1919).* |
| Rivest, et. al. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, communications of the ACM 1978.* |
| Delfs et. al., Introduction to Cryptography , Springer,2002.* |
| Denning, Cryptography and Data Security, Addison-Wesley.* |
| Simmons, Contemporary Cryptology, The Science of Information Integrity, IEEE Press.* |
| Menezes, et. al. Handbook of Applied Cryptography, CRC Press.* |
| Yasuhiro et. al. Dual reduction Method of Random Keys for Encryption by Graph transformation, 1988.* |
| Gaines, Cryptanalysis, 1956.* |
| Schneier, Applied Cryptography, 1988.* |
| jOxford English Dictionary, 2nd edition.* |
| Krishnamurty, Computer Cryptographic Techniques for Processing and Storage of Cofidential Information, Int. J. Control 1970.* |
| Solution to the/cryptology/Beale problem, http://einstein.et.tudelft.nl/˜arlet/puzzles/sol.cgi/cryptology/Beale, Dec. 14, 1999, pp. 1-5. |
| Internet-ERA Cryptographic Methods, http://tryagain.com/humcivil/crptweb.htm, Dec. 14, 1999, p. 1. |
| Leonardo/Daniel, Floating-Key Cryptography, D&G Sciences—Virginia Technology Corporation, Limited Release Notes, info@dgsciences.com, pp. 1-8. |
| Gideo Samid, “Cryptographic Possibilities Suggested by Certain Expansion-Reduction Algorithms”, AGS Encryptions, Ltd., Jul. 4, 1999, pp. 1-23. |