References
- William Stallings, “Cryptography and Network Security: Principles and Practices”, Third edition, Chapter 2, pp.37.
- Feistel, H. “Cryptography and Computer Privacy”, Scientific American, vol. 228, No. 5, pp.15–23, 1973.
- Feistel, H., Notz. W., and Smith, J. “Some Cryptographic Techniques for Machine-to-Machine Data Communications”, Proceedings of the IEEE, vol. 63, No. 11, pp. 1545–1554, Nov. 1975.
- V. U. K. Sastry, V. Janaki, “On the Modular Arithmetic Inverse in the Cryptology of Hill Cipher”, Proceedings of North American Technology and Business Conference, September 2005, Montreal, Canada.