On the Design of Permutation P in DES Type Cryptosystems
暂无分享,去创建一个
[1] William Caelli. Computer security in the age of information : proceedings of the Fifth IFIP International Conference on Computer Security, IFIP/Sec '88, Gold Coast, Queensland, Australia, 19-21 May, 1988 , 1989 .
[2] H. Feistel. Cryptography and Computer Privacy , 1973 .
[3] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[4] Martin E. Hellman. I. `DES will be totally insecure within ten years¿ , 1979, IEEE Spectrum.
[5] Carl H. Meyer,et al. Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds for the data encryption standard , 1899, AFIPS National Computer Conference.
[6] Donald W. Davies. Some Regular Properties of the 'Data Encryption Standard' Algorithm , 1982, CRYPTO.
[7] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[8] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[9] Ralph Howard,et al. Data encryption standard , 1987 .
[10] R. Sugarman. Communications: On foiling computer crime: Can a thief with lots of LSI chips crack present data scrambling schemes? The experts debate the matter , 1979, IEEE Spectrum.
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] J. Dénes,et al. Latin squares and their applications , 1974 .
[13] Joos Vandewalle,et al. Analytical Characteristics of the DES , 1983, CRYPTO.