1[1]Lai X. On the Design and Security of Block Ciphers. ETH Series in Information Processing,v. 1, Konstanz: Hartung - Gorre Verlag, 1992.
2[2]Scheneier B. Applied Cryptography - Protocols, algorithms, and source code in C" ( Second Edition) [ M].吴世忠,祝世雄,张文政等译.应用密码学--协议、算法与C源程序[M].北京:机械工业出版社,2000.
3[3]Adams C, Lioyed S. Understanding Public - Key Infrastructure: Concepts, Standards, and Deloyment Considerations[M].冯登国等译.公开密钥基础设施--概念、标准和实施[M].北京:人民邮电出版社,2001.