Cryptography Reference
In-Depth Information
[25]
Shannon, C.E., “Communication Theory of Secrecy Systems,”
Bell System Technical Journal
,
Vol. 28, No. 4, October 1949, pp. 656-715.
[26]
Vernam, G.S., “Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic
Communications,”
Journal of the American Institute for Electrical Engineers
, Vol. 55, 1926, pp.
109-115.
[27]
Maurer, U.M., “Secret Key Agreement by Public Discussion,”
IEEE Transaction on Information
Theory
, Vol. 39, No. 3, 1993, pp. 733-742.
[28]
Matsui, M., “New Block Encryption Algorithm MISTY,”
Proceedings of the Fourth International
Fast Software Encryption Workshop (FSE '97)
, Springer-Verlag, LNCS 1267, 1997, pp. 54-68.
[29]
Otha, H., and M. Matsui,
A Description of the MISTY1 Encryption Algorithm
, Request for
Comments 2994, November 2000.
[30]
Aoki, K., et al., “Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms—Design and
Analysis,”
Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptography (SAC
2000)
, Springer-Verlag, LNCS 2012, August 2000, pp. 39-56.
[31]
Junod, P., and S. Vaudenay, “FOX: a new family of block ciphers,”
Proceedings of the Eleventh
Annual Workshop on Selected Areas in Cryptography (SAC 2004)
, Springer-Verlag, LNCS 3357,
2004, pp. 114-129.