1. B. Schneier, Applied Cryptography 2nd Edition, John Willey & Sons Inc, New York, 1996.
2. A. Menezes, Van Oorschot O., Vanstone S., Handbook of Applied Cryptography, CRC Press, 1997.
3. W. Stallings, Network Security Essentials Applications and Standards, Prentice Hall, New Jersey, 2000.
4. D.R. Stinson, Cryptography Theory and Practice, CRC Press, 1995.
5. D. Wagner, L.Simpson, E.Dawson, J.Kelsey, W.Millan, B. Schneier, Cryptanalysis of ORYX, Fifth Annual Workshop on Selected Areas in Cryptography, Springer Verlag, 1998.
6. ANSI X3.106, “American National Standard for Information Systems – Data Encryption Standard- Modes of Operation”, American National Standard Institute, 1983.
7. “The RC5 Encryption Algorithm”, B. Prencel, Fast Software Encryption, Second International Workshop (LNCS 1008) 86-96 Springer-Verlag, 1995.
8. “SAFER K-64: One year later”, B.Preneel, editor, Fast Software Encryption, Second International Workshop (LNCS 1008), 212–241, Springer-Verlag, 1995.
9. B. Schneier, “Description of a new variable-length key, 64-bit block cipher (Blowfish)”, R. Anderson, editor, Fast Software Encryption, Cambridge Security Work-shop (LNCS 809), 191–204, Springer-Verlag, 1994.
10. S. Miyaguchi, “The FEAL cipher family”, Advances in Cryptology–CRYPTO ’90 (LNCS 537), 627–638, 1991.
11. P. Rogaway, D. Coppersmith, “A Sofware Optimized Encryption Algorithm”, Journal of Cryptology, 273-287, 1998.
12. Golic J. Dj., Cryptanalysis of Alleged A5 Stream Cipher , Proceedings of Eurocrypt 97, Springer LNCS 1233, 239-255, 1997.
13. D. Kahn, “The Code Breakers- The Comprehensive History of Secret Communication from Ancient Times to the Internet” , Revised and Updated Edtion, Scribner, USA, 1996.
14. M.J.B. Robsaw, “Stream Ciphers”, RSA Laboratories Technical Report, 1995.
15. J. Kahanek, “Protecting Business Application with Encryption Symmetric and Asymmetric”, 2000.
16. D.J.Wheeler, R.M.Needham, “TEA, a Tiny Encryption Algorithm”, Cambridge University, England.
17. C.M.Adams, “Simple and Effective Key Scheduling fo Symmetric Ciphers”, Workshop on selected Areas in Cryptography Workshop Record, Kingston, Ontario, pp. 129-133, 5-6 May 1994.
18. C.M. Adams “Symmetric Cryptographic System for data encryption”, U.S Patent 5,511,123, 1996.
19. Rivest, Shamir, ve Adleman. “A method for obtaining digital signatures and public-key cryptosystems”. Comm. ACM, 120-126, 1978.
20. MasterCard Inc. SET Secure Electronic Transaction Specification, Book 1: Business Description, MasterCard Inc., May 1997.
21. A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol Version 3, Netscape Communications Corp., available from http://home.netscape.com/eng/ssl3, 1996.
22. C.P.Pfleeger, "Security in Computing" Second Edition, Prentice Hall, 1997.
Thank you for copying data from http://www.arastirmax.com