1 |
E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, J. of CRYPTOLOGY Vol. 4 No. 1, 1991.
|
2 |
B. Schneier, Applied Cryptography : Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., New York, USA, 1994.
|
3 |
W. Diffie and M. E. Hellman, "New directions in Cryptography," IEEE Trans. on Infor. Theory, Vol. IT-22, No. 6, pp. 644-654, Nov. 1976.
|
4 |
R. Revest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," CACM, Vol. 21, No. 2, pp. 120-126, Feb. 1978.
DOI
ScienceOn
|
5 |
W.Stallings, Cryptography and Network Security, Prentice Hall, 1998.
|
6 |
B. Schneier, Applied Cryptography : Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., New York, USA, 1994.
|
7 |
D. R. Stinson, Cryptography Theory and Practice, Chapman & Hall/CRC, 2002.
|
8 |
H. Miyano, A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis, Abstracts of ASIACRYPT91, 1991.
|
9 |
서광석, 김창한, 암호학과 대수학, 북스힐, 1999.
|
10 |
T. Siegenthaler, "Decrypting a Class of Stream Ciphers Using Ciphertext Only," IEEE Trans. on Computer, Vol. C-34, No. 1, pp. 81-85, Jan. 1985.
DOI
|
11 |
R.Rueppel, "Stream Ciphers," Contemporary Cry ptology: The science of Infor. Integrity, New York, IEEE Press, pp. 65-134, 1991.
|
12 |
이병관, 전자상거래 보안, 남두도서, 2002.
|
13 |
VISA Open Platform Overview, 1999.
|