1 |
Shoji Miyaguchi, 'The FEAL cipher family', In Alfred J. Menezes and Scott A. Vanstone, editors, Advances in Crypto1ogy-Crypto'90, Vol. 537 of Lecture Notes in Computer Science, Sprmger-Verlag, Berlin, pp. 627-638, 1990
|
2 |
Bruce Schneider, 'Applied Cryptography, Second Edition-Protocols, Algorithms, and Souice Cbde in C', John Wiley & Sons, 1996
|
3 |
Eli Biham and Adi Shamir, 'Differential cr yptanalysis of DES-like cryptosystems', Jo umal of Crypto1ogy4(1). pp. 3-72, 1991
DOI
|
4 |
D. E. Denning, 'The data encryption stand ard : Fifteen years of public secuhty', Dist. Lecture, 6th Annual Comp. Security Appl. Conf., IEEE Comp, Soc. Press, ppx-xv , 1990
|
5 |
X. Lai, 'On the Design and Security of Block Ciphers', ETH Series in Information Processing, Vol. 1, 1992
|
6 |
Kaisa Nyberg and Lars R. Knudsen, 'Provable secuhty against a differential attack', Jour nal of Cryptology S(l), PP. 27-37, 1995
|
7 |
A. Shimizu, S. Miyaguchi, 'Fast Data Encipherment Algorithm, FEAL', Proc. of Eurocrypt 91, 1991
|
8 |
E. Biham, A. Shamir, 'Differential Cryptan alysis of Data Encryption Standard', Sprin ger-Verlag, 1993
|
9 |
Mitsuru Matsui, 'Linear oyptanalysis method for DES cipher', In Tor Helleseth, editor, Advances in Crypto1ogy-Eurocrypt'93, Vol. 765 of Leture Notes in Computer Science, Springer-Verlag, Berlin, pp. 386-397, 1994
|
10 |
C. H. Paradimitriou, Computational Com plexity, Addison-Wesley, Reading, Massach usetts, 1994
|
11 |
R. D. Silverman, 'A cost-based Security analysis of symmetric asymmetric Ke ylengths', Bulletin 13, RSA Lab., 2000
|