Egon Balas and Manfred W.
Padberg.
Set partitioning --- a survey.
In Nicos Christofides, editor, Combinatorial Optimization,
chapter 7, pages 151-210. Wiley, 1979.
H. Dobbertin,
A. Bosselaers, and B. Preneel.
RIPEMD-160: A strengthened version of RIPEMD.
In Dieter Gollmann, editor, Fast Software Encryption: Third International
Workshop, pages 71-82. Springer-Verlag, Cambridge, UK, February 1996.
Lecture Notes in Computer Science 1039.
John L. Hennessy and
David A. Patterson.
Computer Architecture: A Quantitative Approach.
Morgan Kaufmann Publishers, second edition, 1996.
Brian W. Kernighan.
Why Pascal is not my favorite programming language.
Computer Science Technical Report 100, Bell Laboratories, Murray Hill, NJ, USA,
July 1981.
Available online at http://cm.bell-labs.com/cm/cs/cstr. (Reprinted in Comparing
and Assessing Programming Languages Ed. A. Feuer N. Gehani Prentice-Hall
1984).
David P. Maher.
Fault induction attacks, tamper resistance, and hostile reverse engineering in
perspective.
In Rafael Hirschfeld, editor, Financial Cryptography: First International
Conference, FC '97, pages 109-121, Anguilla, British West Indies,
February 1997. Springer-Verlag.
Lecture Notes in Computer Science 1318.
Jef Poskanzer et al.
NETPBM: Extended portable bitmap toolkit.
Available online ftp://ftp.x.org/contrib/utilities/, December 1993.
Release 7.
W. H. Press, B. P.
Flannery, S. A. Teukolsky, and W. T. Vetterling.
Numerical
Recipes in C, pages 343-352.
Cambridge University Press, 1988.
Eugene H. Spafford.
The internet worm program: An analysis.
Technical Report CSD-TR-823, Purdue University, West Lafayette, IN 47907-2004,
November 1988.