The Role of Latin Square in Cipher Systems : A Matrix Approach to Model Encryption Modes of Operation
暂无分享,去创建一个
[1] Adi Shamir,et al. On the Generation of Cryptographically Strong Pseudo-Random Sequences , 1981, ICALP.
[2] H. Feistel. Cryptography and Computer Privacy , 1973 .
[3] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[6] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[7] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[8] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[9] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[10] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[11] Anand Desai,et al. The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search , 2000, CRYPTO.
[12] M. Näslund. All Bits in ax + b mod p are Hard , 1996, CRYPTO 1996.
[13] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[17] William C. Frederick,et al. A Combinatory Logic , 1995 .
[18] Stephen M. Matyas,et al. Triple DES Cipher Block Chaining with Output Feedback Masking , 1996 .