Cryptography Reference
In-Depth Information
[115] A.K. Lenstra, H.W. Lenstra.
The Development of the Number Field Sieve
. Springer-Verlag,
NY, 1993.
[116] S. Levy.
Crypto
. Penguin Books, NY, 2001.
[117] R. Lidl, H. Niederreiter.
Introduction to Finite Fields and Their Applications
. Cambridge
University Press, Cambridge, 1994.
[118] B. Lloyd, W. Simpson. PPP Authentication Protocols. Internet Standard. RFC 1334,
1992.
[119] M. Luby, C. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom
Functions.
SIAM Journal on Computing
, vol. 17, pp. 373-386, 1988.
[120] W. Mao.
Modern Cryptography—Theory and Practice
. Prentice Hall PTR, Upper Saddle
River, NJ, 2003.
[121] J.L. Massey. SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. In
Fast Software
Encryption'94
, Cambridge, UK, Lecture Notes in Computer Science 809. Springer-Verlag,
NY, 1994, 1-17.
[122] J.L. Massey. SAFER K-64: One Year Later. In
Fast Software Encryption'95
, Leuven,
Belgium, Lecture Notes in Computer Science 1008. Springer-Verlag, NY, 1995, pp. 212-
241.
[123] J.L. Massey. Guessing and Entropy. In
IEEE International Symposium on Information
Theory
, Tronheim, Norway, 1994, pp. 204.
[124] M. Matsui. Linear Cryptanalysis Methods for DES Cipher. In
Advances in Cryptology
EUROCRYPT'93
, Lofthus, Norway, Lecture Notes in Computer Science 765. Springer-
Verlag, NY, 1994, pp. 386-397.
[125] M. Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard. In
Advances in Cryptology CRYPTO'94
, Santa Barbara, CA, Lecture Notes in Computer
Science 839. Springer-Verlag, NY, 1994, pp. 1-11.
[126] M. Matsui. New Structure of Block Ciphers with Provable Security against Differential
and Linear Cryptanalysis. In
Fast Software Encryption'96
, Cambridge, UK, Lecture Notes
in Computer Science 1039. Springer-Verlag, NY, 1996, pp. 205-218.
[127] M. Matsui. New Block Encryption Algorithm MISTY. In
Fast Software Encryption'97
,
Haifa, Israel, Lecture Notes in Computer Science 1267. Springer-Verlag, NY, 1997, pp. 54-
68.
[128] A.J. Menezes, P.C. van Oorschot, S.A. Vanston.
Handbook of Applied Cryptography
. CRC,
NY, 1997.
[129] R.C. Merkle. Secure Communications over Insecure Channels.
Communications of the
ACM
, vol. 21, pp. 294-299, 1978.
Search WWH ::
Custom Search