Foundations of Symmetric Cryptography
暂无分享,去创建一个
[1] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[2] Goutam Paul,et al. RC4 Stream Cipher and Its Variants , 2011 .
[3] Jennifer Seberry,et al. Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.
[4] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[5] Pulak Mishra,et al. Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .
[6] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[7] Eli Biham,et al. A New Attack on 6-Round IDEA , 2007, FSE.
[8] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[9] Eli Biham,et al. Differential Cryptanalysis of the Full 16-Round DES , 1992, CRYPTO.
[10] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[11] Ralph Howard,et al. Data encryption standard , 1987 .
[12] Elaine B. Barker,et al. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.