1 |
"New European Schemes for Signatures. Integrity. and Encryption(NESSIE)," http://cryptonessie.org/
|
2 |
SEED, http://http://www.kisa.or.kr/seed/
|
3 |
E. Biham and A. Shamir, 'Differential cryptanalysis for DES-like cryptosystem,' Journal of Cryptlogy 4(1): 3-17, 1991
DOI
|
4 |
L. R. Knudsen, "Truncated and higher order differential," Fast Software Encryption-Second International Workshop, LNCS Vol.1008, pp. 196- 211, 1995
|
5 |
C. E. Shannon, "Communication theory of secrecy system," Bell System Technical Journal, Vol.28, No.4, pp. 656-715, 1949
DOI
|
6 |
"Report on the Development of the Advanced Encryption Standard(AES)," http://www.csrc.nist.gov/encryption/aes/
|
7 |
J. Daemen, L. Knudsan, and V. Rijmen, "The block cipher square," Proceeding of FSE`97 LNCS Vol.1267, pp. 149-165, 1997
|
8 |
ARIA, http://www.nsri.re.kr/ARIA/
|
9 |
S. Contini, R.L. Rivest, M.J.B. Robshaw, and Y.L. Yin, "The security of RC6," http://www.rsasecurity. com/rsalabs/aes
|
10 |
"Cryptography Research and Evaluation Committees (CRYPTREC)," http://www.cryptrec.go.jp/
|
11 |
M. Matsui, "Linear cryptanalysis method for DES cipher," In Tor Helleseth, editor, Advances in Cryptology-Eurocrypt `93, LNCS Vol.765, pp. 386- 397, 1994
|
12 |
H. Feistel, "Cryptography and Computer Privacy," Scientific American, Vol.228, No.5, pp. 15-23, 1973
DOI
PUBMED
ScienceOn
|