@book{stallings2011,
	author		= {William Stallings},
	title		= {Cryptography and Network Security: Principles and Practice},
	publisher	= {Pearson Education, Inc},
	year		= {2011},
	edition		= {5},
}
@article{landau2000,
	author		= {Susan Landau},
	title		= {Standing the Test of Time: The Data Encryption Standard},
	year		= {2000},
	journal		= {Notices of the AMS},
	volume		= {47},
	number		= {3},
	pages		= {341-349}
}
@article{mousa2006,
	author		= {Allam Mousa and Ahmad Hamad},
	title		= {Evaluation of the RC4 Algorithm for Data Encryption},
	year		= {2006},
	journal		= {International Journal of Computer Science and Applications},
	volume		= {3},
	number		= {2},
	pages		= {44-56}
}
@misc{daemen1999,
	author		= {Joan Daemen and Vincent Rijmen},
	title		= {AES Proposal: Rijndael},
	month		= {03},
	year		= {1999}
}


@article{diffie_new_1976,
	title = {New directions in cryptography},
	volume = {22},
	url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1055638},
	number = {6},
	urldate = {2013-10-09},
	journal = {Information Theory, {IEEE} Transactions on},
	author = {Diffie, Whitfield and Hellman, Martin},
	year = {1976},
  pages = {644--654},
},

@article{elgamal_public_1985,
	title = {A public key cryptosystem and a signature scheme based on discrete logarithms},
	volume = {31},
	issn = {0018-9448},
	doi = {10.1109/TIT.1985.1057074},
	number = {4},
	journal = {Information Theory, {IEEE} Transactions on},
	author = {Elgamal, T.},
	month = jul,
	year = {1985},
	pages = {469--472},
},

@article{koblitz_elliptic_1987,
	title = {Elliptic curve cryptosystems},
	volume = {48},
	url = {http://www.ams.org/mcom/1987-48-177/S0025-5718-1987-0866109-5/},
	number = {177},
	urldate = {2013-10-09},
	journal = {Mathematics of computation},
	author = {Koblitz, Neal},
	year = {1987},
	pages = {203--209},
},

@article{rivest_method_1978,
	title = {A method for obtaining digital signatures and public-key cryptosystems},
	volume = {21},
	url = {http://dl.acm.org/citation.cfm?id=359342},
	number = {2},
	urldate = {2013-10-09},
	journal = {Communications of the {ACM}},
	author = {Rivest, Ronald L. and Shamir, Adi and Adleman, Len},
	year = {1978},
	pages = {120--126},
},

@article{merkle_secure_1978,
	title = {Secure communications over insecure channels},
	volume = {21},
	number = {4},
	journal = {Commun. {ACM}},
	author = {Merkle, Ralph C.},
	year = {1978},
	pages = {294--299},
}
