A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption
暂无分享,去创建一个
[1] G. Amdhal,et al. Validity of the single processor approach to achieving large scale computing capabilities , 1967, AFIPS '67 (Spring).
[2] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[3] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[4] Ralph Howard,et al. Data encryption standard , 1987 .
[5] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .
[6] H. Feistel. Cryptography and Computer Privacy , 1973 .
[7] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[8] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[9] H. Anton,et al. Elementary linear algebra : applications version , 2008 .
[10] René Govaerts,et al. A New Approach Towards Block Cipher Design , 1993, FSE 1994.
[11] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[12] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[13] Bruce Schneier,et al. Improved Cryptanalysis of Rijndael , 2000, FSE.
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Joos Vandewalle,et al. A New Approach to Block Cipher Design , 1993, FSE.
[16] William Stallings,et al. Cryptography and network security , 1998 .
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .