A Layered Approach to the Design of Private Key Cryptosystems
暂无分享,去创建一个
[1] Alan T. Sherman,et al. Is the data encryption standard a group , 1986 .
[2] G. Blakley,et al. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages , 1979 .
[3] H. Feistel. Cryptography and Computer Privacy , 1973 .
[4] Stafford E. Tavares,et al. A Layered Broadcast Cryptographic System , 1984, CRYPTO 1984.
[5] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[6] Alan G. Konheim. Cryptography, a primer , 1981 .
[7] Donald W. Davies. Some Regular Properties of the 'Data Encryption Standard' Algorithm , 1982, CRYPTO.
[8] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[9] Donald W. Davies,et al. Some Regular Properties of the DES , 1981, CRYPTO.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] S. Akl,et al. Two New Secret Key Cryptosystems , 1985, EUROCRYPT.
[12] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[13] Stafford E. Tavares,et al. Sequence Complexity as a Test for Cryptographic Systems , 1985, CRYPTO.
[14] Abraham Lempel,et al. On the Complexity of Finite Sequences , 1976, IEEE Trans. Inf. Theory.
[15] Ronald L. Rivest,et al. Is the Data Encryption Standard a Group? (Preliminary Abstract) , 1985, EUROCRYPT.