1 |
M. Salmasizadeh, J. Dj. Goli'c, E. Dawson, L. Simpson, "A Systematic Procedure for Applying Fast Correlation Attacks to Combiners with Memory", In Workshop on Selected Areas in Cryptography(SAC 97), pp. 102-115, 1997.
|
2 |
L. Brown and J. Seberry, "On the Design of Permutation P in Des Type Cryptosystem", Abstract of AUSCRYPT'90, 1990.
|
3 |
C. Ding, V. Niemi, A. Renvall, and A. saloma, "Twoprime : A Fast Stream Ciphering Algorithm", Fast Software Encryption'97, Springer-Verlag, pp. 82-96, 1997.
|
4 |
B. Schneier, "Applied Cryptography : Protocols, Algorithms, and Source Code in C", John Wiley & Sons, Inc., New York, USA, 1994.
|
5 |
Third AES candidate conference, "AES3 Proceedings, http://csrc.nist.gov/encryption/aes/round2/conf3/papers/", pp. 44-54, April, 2000.
|