High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
暂无分享,去创建一个
K. P. Subbalakshmi | Chetan Nanjunda Mathur | Karthik Narayan | C. N. Mathur | K.P. Subbalakshmi | K. Narayan
[1] Kaisa Nyberg,et al. Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.
[2] Joan Daemen,et al. Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .
[3] Stefan Lucks,et al. Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys , 2000, AES Candidate Conference.
[4] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[5] Walter Godoy,et al. A proposal of a cryptography algorithm with techniques of error correction , 1997, Comput. Commun..
[6] Thomas A. Berson,et al. Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack , 1997, CRYPTO.
[7] Marine Minier,et al. A Collision Attack on 7 Rounds of Rijndael , 2000, AES Candidate Conference.
[8] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[9] Tzonelih Hwang,et al. Secret Error-Correcting Codes (SECC) , 1988, CRYPTO.
[10] H. Feistel. Cryptography and Computer Privacy , 1973 .
[11] Tor Helleseth,et al. Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .
[12] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[13] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[14] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[15] Vincent Rijmen,et al. The Wide Trail Design Strategy , 2001, IMACC.
[16] Eli Biham,et al. Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer , 1991, CRYPTO.
[17] D. Chaum,et al. Di(cid:11)erential Cryptanalysis of the full 16-round DES , 1977 .
[18] van Hca Henk Tilborg. Coding theory at work in cryptology and vice versa , 1998 .
[19] Israel Bar-David,et al. Capacity and coding for the Gilbert-Elliot channels , 1989, IEEE Trans. Inf. Theory.
[20] David A. Wagner,et al. Integral Cryptanalysis , 2002, FSE.
[21] Rajarathnam Chandramouli,et al. Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[22] S. Wicker. Error Control Systems for Digital Communication and Storage , 1994 .