"Do-it-yourself" cryptography
暂无分享,去创建一个
[1] H. Feistel. Cryptography and Computer Privacy , 1973 .
[2] John M. Carroll. The Resurrection of Multiple-Key Ciphers , 1984, Cryptologia.
[3] John M. Carroll,et al. Using binary derivatives to test an enhancement of DES , 1983 .
[4] A. I. McLeod,et al. A Remark on Algorithm as 183. An Efficient and Portable Pseudo‐Random Number Generator , 1985 .
[5] Ingrid Schaumüller-Bichl,et al. A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques , 1985, EUROCRYPT.
[6] Ed Dawson,et al. Comparison of Block Ciphers , 1990, AUSCRYPT.
[7] Ed Dawson,et al. Universal Logic Sequences , 1990, AUSCRYPT.
[8] Jennifer Seberry,et al. LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications , 1990, AUSCRYPT.
[9] John M. Carroll,et al. Computer Cryptanalysis of Product Ciphers , 1989, Cryptologia.
[10] Justo Sancho. Enumeration of multivariable decipherable Boolean Functions , 1987, Cryptologia.