Cryptography Reference
In-Depth Information
[25]
Shannon, C.E., “Communication Theory of Secrecy Systems,” Bell System Technical Journal ,
Vol. 28, No. 4, October 1949, pp. 656-715.
[26]
Vernam, G.S., “Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic
Communications,” Journal of the American Institute for Electrical Engineers , Vol. 55, 1926, pp.
109-115.
[27]
Maurer, U.M., “Secret Key Agreement by Public Discussion,” IEEE Transaction on Information
Theory , Vol. 39, No. 3, 1993, pp. 733-742.
[28]
Matsui, M., “New Block Encryption Algorithm MISTY,” Proceedings of the Fourth International
Fast Software Encryption Workshop (FSE '97) , Springer-Verlag, LNCS 1267, 1997, pp. 54-68.
[29]
Otha, H., and M. Matsui, A Description of the MISTY1 Encryption Algorithm , Request for
Comments 2994, November 2000.
[30]
Aoki, K., et al., “Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms—Design and
Analysis,” Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptography (SAC
2000) , Springer-Verlag, LNCS 2012, August 2000, pp. 39-56.
[31]
Junod, P., and S. Vaudenay, “FOX: a new family of block ciphers,” Proceedings of the Eleventh
Annual Workshop on Selected Areas in Cryptography (SAC 2004) , Springer-Verlag, LNCS 3357,
2004, pp. 114-129.
Search WWH ::




Custom Search