Cryptography Reference
In-Depth Information
[115] A.K. Lenstra, H.W. Lenstra. The Development of the Number Field Sieve . Springer-Verlag,
NY, 1993.
[116] S. Levy. Crypto . Penguin Books, NY, 2001.
[117] R. Lidl, H. Niederreiter. Introduction to Finite Fields and Their Applications . Cambridge
University Press, Cambridge, 1994.
[118] B. Lloyd, W. Simpson. PPP Authentication Protocols. Internet Standard. RFC 1334,
1992.
[119] M. Luby, C. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom
Functions. SIAM Journal on Computing , vol. 17, pp. 373-386, 1988.
[120] W. Mao. Modern Cryptography—Theory and Practice . Prentice Hall PTR, Upper Saddle
River, NJ, 2003.
[121] J.L. Massey. SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. In Fast Software
Encryption'94 , Cambridge, UK, Lecture Notes in Computer Science 809. Springer-Verlag,
NY, 1994, 1-17.
[122] J.L. Massey. SAFER K-64: One Year Later. In Fast Software Encryption'95 , Leuven,
Belgium, Lecture Notes in Computer Science 1008. Springer-Verlag, NY, 1995, pp. 212-
241.
[123] J.L. Massey. Guessing and Entropy. In IEEE International Symposium on Information
Theory , Tronheim, Norway, 1994, pp. 204.
[124] M. Matsui. Linear Cryptanalysis Methods for DES Cipher. In Advances in Cryptology
EUROCRYPT'93 , Lofthus, Norway, Lecture Notes in Computer Science 765. Springer-
Verlag, NY, 1994, pp. 386-397.
[125] M. Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard. In
Advances in Cryptology CRYPTO'94 , Santa Barbara, CA, Lecture Notes in Computer
Science 839. Springer-Verlag, NY, 1994, pp. 1-11.
[126] M. Matsui. New Structure of Block Ciphers with Provable Security against Differential
and Linear Cryptanalysis. In Fast Software Encryption'96 , Cambridge, UK, Lecture Notes
in Computer Science 1039. Springer-Verlag, NY, 1996, pp. 205-218.
[127] M. Matsui. New Block Encryption Algorithm MISTY. In Fast Software Encryption'97 ,
Haifa, Israel, Lecture Notes in Computer Science 1267. Springer-Verlag, NY, 1997, pp. 54-
68.
[128] A.J. Menezes, P.C. van Oorschot, S.A. Vanston. Handbook of Applied Cryptography . CRC,
NY, 1997.
[129] R.C. Merkle. Secure Communications over Insecure Channels. Communications of the
ACM , vol. 21, pp. 294-299, 1978.
Search WWH ::




Custom Search