[[1] SHINDER, D. : Deploying VoIP: Weigh the pros and cons of convergence http://articles.techrepublic.com.com/ 5100-10878 11-6187594.htm, May 31, 2007, last visit 7/8/2010.]Search in Google Scholar
[[2] Computers at Risk: Safe computing in the information age, USA National Research Council,1991.10.1016/0142-0496(91)90226-U]Search in Google Scholar
[[3] STALLING, W. : Cryptography and Network Security, Prentice Hall, 2005.]Search in Google Scholar
[[4] KNUDSEN, L.et al : Analysis Method for Alleged RC4, Proceedings ASIACRYPT ’98, 1998.10.1007/3-540-49649-1_26]Search in Google Scholar
[[5] MISTER, S., ANDTAVARES, S. : Cryptanalysis of RC4-Like Ciphers, Proceedings Workshop in Selected Areas of Cryptography SAC ’98, 1998.10.1007/3-540-48892-8_11]Search in Google Scholar
[[6] FLUHRER, S.-McGREW, D. : Statistical Analysis of the Alleged RC4 Key Stream Generator, Proceedings Fast Software Encryption, 2000.10.1007/3-540-44706-7_2]Search in Google Scholar
[[7] MANTIN, I.-HAMIR, A. : A Practical Attack on Broadcast RC4, Proceedings Fast Software Encryption, 2001.10.1007/3-540-45473-X_13]Search in Google Scholar
[[8] FLUHRER, S.-MANTIN, I.-SHAMIR, A. : Weakness in the Key Scheduling Algorithm of RC4., Proceedings Workshop in Selected Areas of Cryptography, 2001.10.1007/3-540-45537-X_1]Search in Google Scholar
[[9] RIAD, A. M.-SHEHATA, A. R.-HAMDY, E. K.-ABOUALSOUAD, M. H.-IBRAHIM, T. R. : Evaluation of the RC4 Algorithm as a Solution for Converged Networks, J. Electrical Engineering 60 No. 3 (June 2009).]Search in Google Scholar
[[10] A Statiistiical Test Suiite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, 2001.]Search in Google Scholar
[[11] ESSLINGER, B. : The CrypTool Script: Cryptography, Mathematics and More, www.cryptool.org,2008.]Search in Google Scholar
[[12] HOWITT, D. ANDCRAMER, D. : Statistics in Psychology, Prentice Hall, 2008.]Search in Google Scholar
[[13] ESSLINGER, B. : Cryptology with cryptool v 1.4.20, cryptool v1.4.21, www.cryptool.com, 2009.]Search in Google Scholar
[[14] Wikipedia.]Search in Google Scholar
[[15] SCHIESTL, C. : Pseudozufallszahlen in der Kryptographie, Klagenfurt, 1999.]Search in Google Scholar
[[16] http://www.bookrags.com/wiki/Berlekamp-Massey algorithm, Last visit 8/8/2010.]Search in Google Scholar
[[17] HOSAM, El-dinH. : Encryption Efficiency Analysis and Security Evaluation Of R C6 Block Cipher for Digital Images, International Journal of Computer, Information, System Science and Engineering 1 No. 1 (winter 2007).]Search in Google Scholar
[[18] HOSSAM, El-din H. AHMED-KALASH, H. M.-FARAG ALLAH, O. S. : Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images, Journal of Optical Engineering 45 (2006).10.1117/1.2358991]Search in Google Scholar