Appelbaum, Jacob, Joseph A. Calandrino, William Clarkson, Edward W. Felten, Ariel J. Feldman, J. Alex Halderman, Nadia Heninger, Seth D. Schoen, and William Paul. Lest We Remember: Cold-boot Attacks on Encryption Keys. 52(5): 91-98. Commun. ACM. 2009. Also available at http://doi.acm.org/10.1145/1506409.1506429.
Greenwald, Glenn. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. 2014. Metropolitan Books. USA.
Gutmann, Peter. "An Open-Source Cryptographic Coprocessor." Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9, SSYM'00: 8-8. USENIX Association, Berkeley, CA, USA. 2000. Also available at http://dl.acm.org/citation.cfm?id=1251306.1251314.
Langner, Ralph. Stuxnet: Dissecting a Cyberwarfare Weapon. 9(3): 49-51. IEEE Security and Privacy. 2011. Also available at http://dx.doi.org/10.1109/MSP.2011.67.
Levy, Steven. Crypto: How the Code Rebels Beat the Government: Saving Privacy in the Digital Age. Penguin USA, New York, NY, USA. 2001.
Tygar, J. D. and Alma Whitten. "Why Johnny can't encrypt: A Usability Evaluation of PGP 5.0." Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, SSYM'99: 14-14. USENIX Association Berkeley, CA, USA. 1999. Also available at http://dl.acm.org/citation.cfm?id=1251421.1251435.
Zimmermann, Philip R. PGP Source Code and Internals. MIT Press, Cambridge, MA, USA. 1995.
Zimmermann, Philip R. The Official PGP User's Guide. MIT Press, Cambridge, MA, USA. 1995.