| “Applied Cryptography”; 2nd Ed., Bruce Schneier, Oct. 18, 1995, John Wiley & Sons, Chap. 22.* |
| Diffie, W. et al.: Authentication and Authenticated Key Exchanges: Designs, Codes and Cryptography, US, Kluwer Academic Publishers, Boston; vol. 2, No. 2, pp. 107-125. Jun. 1, 1992. |
| Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography: CR Press, US, Boca Raton, FL. pp. 397-405, 515-524, 538, 717; 1997. |
| Frankel, Yair et al.: Security Issues In A CDPD Wireless Network: IEEE Personal Communications, US, IEEE Communications society, vol. 2, No. 4, pp. 16-27, Aug. 1, 1995. |
| Ben-Aroya, Ishai et al.: Differential Cryptanalysis of Lucifer: Proceedings Of The Annual International Cryptology Conference (Crypto), DE, Berlin, Springer, vol. CNF. 13, Abstract, pp. 187-199, 1993. |