Analysis of Certain Aspects of Output Feedback Mode
暂无分享,去创建一个
[1] Carl H. Meyer,et al. Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds for the data encryption standard , 1899, AFIPS National Computer Conference.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Donald W. Davies,et al. The average Cycle size of the Key-Stream in Output Feedback Encipherment , 1982, EUROCRYPT.
[4] Donald E. Knuth,et al. The Art of Computer Programming, Volume I: Fundamental Algorithms, 2nd Edition , 1997 .
[5] M. Orceyre,et al. An approach to secure voice communication based on the data encryption standard , 1978, IEEE Communications Society Magazine.
[6] Robert Parry,et al. National Computer Conference: 4-7 May 1981 McCormick Place, Chicago, USA , 1981, Microprocess. Microsystems.
[7] C. Campbell. Design and specification of cryptographic capabilities , 1978, IEEE Communications Society Magazine.
[8] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[9] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[10] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[11] Jason Gait,et al. A New Nonlinear Pseudorandom Number Generator , 1977, IEEE Transactions on Software Engineering.