WESTLUND, Harold B. NIST reports measurable success of Advanced Encryption Standard. Journal of Research of the National Institute of Standards and Technology. 2002. Dostupné online. (anglicky)
iacr.org
eprint.iacr.org
Biryukov, Alex. Related-key Cryptanalysis of the Full AES-192 and AES-256 [online]. 2009-12-04 [cit. 2010-03-11]. Dostupné online. (anglicky)
Alex Biryukov. Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds [online]. 2009-08-19 [cit. 2010-03-11]. Dostupné online. (anglicky)
nytimes.com
John Schwartz. U.S. Selects a New Encryption Technique. New York Times. October 3, 2000. Dostupné online. (anglicky)
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno, Mike Stay. The Twofish Team’s Final Comments on AES Selection [online]. May 2000 [cit. 2011-12-05]. Dostupné v archivu. (anglicky)
Sean Murphy [online]. University of London [cit. 2008-11-02]. Dostupné v archivu pořízeném dne 2009-01-31. (anglicky)
weizmann.ac.il
wisdom.weizmann.ac.il
Dag Arne Osvik1. Cache Attacks and Countermeasures: the Case of AES. www.wisdom.weizmann.ac.il. 2005-11-20. Dostupné online [PDF, cit. 2008-11-02]. (anglicky)