NIS05-5: Energy Efficient Wireless Encryption
暂无分享,去创建一个
[1] Eli Biham,et al. Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer , 1991, CRYPTO.
[2] Kaisa Nyberg,et al. Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.
[3] Joan Daemen,et al. Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .
[4] Marine Minier,et al. A Collision Attack on 7 Rounds of Rijndael , 2000, AES Candidate Conference.
[5] Sourav Mukhopadhyay,et al. Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms , 2006, ICCSA.
[6] K. P. Subbalakshmi,et al. High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive , 2006, ACNS.
[7] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[8] Eli Biham,et al. Differential Cryptanalysis of the Full 16-Round DES , 1992, Annual International Cryptology Conference.
[9] Stefan Lucks,et al. Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys , 2000, AES Candidate Conference.
[10] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[11] H. Feistel. Cryptography and Computer Privacy , 1973 .
[12] Vincent Rijmen,et al. The Advanced Encryption Standard Process , 2002 .
[13] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[14] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[15] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .