Blah [(:biblio:prog:KnuthLCE1985Donald Knuth, Jan 1985. Deciphering a linear congruential encryption. IEEE Transactions on Information Theory, 31(1), IEEE, pp.49-52, ISSN 0018-9448.)] blah [(:biblio:prog:lions1977commentaryLions, J., 1977. A commentary on the Unix operating system. University of New South Wales, Dept. of Computer Science.)] and so it goes plus [(:biblio:prog:GangOfFourErich Gamma, Richard Helm, Ralph Johnson, John Vlissides, 1994. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, Mass.: Addison-Wesley, pp.395, ISBN 0-201-63361-2.)] jhas iwkwjd. As well, [(:biblio:prog:Knuth_LCE1985Donald Knuth, Jan 1985. Deciphering a linear congruential encryption. IEEE Transactions on Information Theory, 31(1), IEEE, pp.49-52, ISSN 0018-9448.)].
dfklsdfgl jsdfglksjdgsfglksjdg lsk sldfkj sldfkgj sdflkgj sdlfgkjsdlsdlk ldldkgjdlkgj dfgllllkfdjg slfgk sdfglsdgjsdlkg jsldfgksdjfg s lkjfdlksdjfg sfgsd hellohhelleo lwkleu kdk
~~REFNOTES~~