Esityksessä on viitteitä seuraaviin kirjoihin, artikkeleihin tai dokumentteihin:
[ABEL85] Abelson, Sussman: Structure and Interpretation of Computer Programs, MIT-Press 1985.
[BERK86] UNIX Programmer's Manual, 4.3 Berkeley Software Distribution, University of California 1986.
[MORA90] François Morain: Thése: Coubres elliptiques et tests de primalité, Devant Université Claude Bernard Lyon 1990.
[NATI80] National Bureau of Standards: Federal Information Processing Standards Publication 81: DES Modes of Operation, December 2, 1980.
[SCHA82] B. P. Schanning: Applying public key distribution to local area networks, Computers &Security, Vol. 1, No. 3, November 1982.
[SEDG83] R. Sedgewick: Algorithms, Addison-Wesley inc. 1983.
[RINN93] T. Rinne, J. Helander, M. Teiste: Sapphire - Secure Data Communications Through Insecure Internet Connection, Library documentation, Cirion oy 1993.
[RIVE78] R. L. Rivest, A. Shamir, and L. Adleman: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, February 1978.
[ZIMM93] Philip Zimmermann, Pretty Good Privacy, Public key encryption for the masses, PGP 2.3 user's guide, Phil's Pretty Good Software 1993.