Cryptography Reference
In-Depth Information
Bibliography
[1] C. Adams and S. Lloyd. Understanding PKI: Concepts, Standards, and
Deployment Considerations. Addison-Wesley Professional. Second edi-
tion, November 16, 2002.
[2] http://csrc.nist.gov/CryptoToolkit/aes/rijndael [last accessed
on April 30, 2011].
[3] http://www.iaik.tugraz.at/research/krypto/AES [last accessed on
April 30, 2011].
[4] http://www2.mat.dtu.dk/people/Lars.R.Knudsen/aes.html [last ac-
cessed on April 30, 2011].
[5] M. Akgun, P. Kavak and H. Demirci. New Results on the Key Schedul-
ing Algorithm of RC4. Preprint, received on May 19, 2008 by email.
INDOCRYPT 2008, pages 40-52, vol. 5365, Lecture Notes in Computer
Science, Springer.
[6] Anonymous (email id: nobody@jpunix.com ). Thank you Bob An-
derson. Cypherpunks mailing list, September 9, 1994. Available at
http://cypherpunks.venona.com/date/1994/09/msg00304.html [last
accessed on January 1, 2009].
[7] S. Babbage. A Space/Time Tradeoff in Exhaustive Search Attacks on
Stream Ciphers. European Convention on Security and Detection, IEE
Conference Publication No. 408, May 1995.
[8] R. Basu, S. Ganguly, S. Maitra and G. Paul. RC4 Keystream Always
Leaks Information about the Hidden Index j. Proceedings of the State
of the Art of Stream Ciphers (SASC), special Workshop hosted by
ECRYPT, the European Network of Excellence in Cryptography, Febru-
ary 13-14, 2008, Lausanne, Switzerland, pages 233-247.
[9] R. Basu, S. Ganguly, S. Maitra and G. Paul. A Complete Characteri-
zation of the Evolution of RC4 Pseudo Random Generation Algorithm.
Journal of Mathematical Cryptology, pages 257-289, vol. 2, no. 3, Octo-
ber, 2008. This is an extended version of the paper [8].
[10] R. Basu, S. Maitra, G. Paul and T. Talukdar. On Some Sequences of the
Secret Pseudo-Random Index j in RC4 Key Scheduling. Applied Algebra,
 
 
Search WWH ::




Custom Search