WESTLUND, Harold B. NIST reports measurable success of Advanced Encryption Standard. Journal of Research of the National Institute of Standards and Technology. 2002. Dostupné online. (anglicky)
iacr.org
eprint.iacr.org
Biryukov, Alex. Related-key Cryptanalysis of the Full AES-192 and AES-256 [online]. 2009-12-04 [cit. 2010-03-11]. Dostupné online. (anglicky)
Alex Biryukov. Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds [online]. 2009-08-19 [cit. 2010-03-11]. Dostupné online. (anglicky)
nytimes.com
John Schwartz. U.S. Selects a New Encryption Technique. New York Times. October 3, 2000. Dostupné online. (anglicky)
rhul.ac.uk
isg.rhul.ac.uk
Sean Murphy [online]. University of London [cit. 2008-11-02]. Dostupné online. (anglicky)
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno, Mike Stay. The Twofish Team’s Final Comments on AES Selection [online]. May 2000 [cit. 2011-12-05]. Dostupné v archivu. (anglicky)
weizmann.ac.il
wisdom.weizmann.ac.il
Dag Arne Osvik1. Cache Attacks and Countermeasures: the Case of AES. www.wisdom.weizmann.ac.il. 2005-11-20. Dostupné online [PDF, cit. 2008-11-02]. (anglicky)