H. Lim, S. Hong, M. S. Choi, S. J. Lee, T. W. Kim, S. W. Lee and B. N. Ha, “Security Protocols Against Cyber Attacks in the Distribution Automation System,” IEEE Transactions on Power Delivery, Vol. 25, No. 1, 2010, pp. 448-455.
 T. Davis, “RSA Encryption,” October 2003. http://www. geometer.org/mathcircles
 J. Messy, H. Kh and K. Kuregian, “Nomination of SAFER+ as a Candidate Algorithm for the AES,” 1998. http://csrc.nist.gov/archive/aes/round1
 A. Schubert and W. Anheier, “Efficient VLSI Implementation of Modern Symmetric Block Ciphers,” 6th IEEE International Conference on Electronics, Circuit and Systems, Pafos, Vol. 2, September 1999, pp. 757-760.
 D. Sharmila and R. Neelaveni, “Performance Analysis of SAFER+ and Triple DES Security Algorithms for Bluetooth Security System,” International Journal of Computer Science and Network Security, Vol. 9, No. 2, 2009, pp. 74-87.
 A. West, “Securing DNP3 and Modbus with AGA12-2J,” IEEE Power and Energy Society General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, 20-24 July 2008, pp. 1-4.