-
1
-
-
0001820140
-
Cryptography and Computer Privacy
-
May
-
H. Feistel, "Cryptography and Computer Privacy,", in Scientific American, Vol. 228, No. 5, May 1973, pp. 15-23.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
2
-
-
34547255839
-
-
National Bureau of Standards, NBS FIPS PUB 46, Data Encryption. Standard, National Bureau of Standards, U.S. Department of Commerce, Jan 1977.
-
National Bureau of Standards, NBS FIPS PUB 46, "Data Encryption. Standard," National Bureau of Standards, U.S. Department of Commerce, Jan 1977.
-
-
-
-
3
-
-
84958635277
-
Fast Data Encipherment Algorithm FEAL
-
Advances in Cryptology, EUROCRYPT '87, Springer-Verlag
-
A. Shimizu and S. Miyaguchi, "Fast Data Encipherment Algorithm FEAL," in Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science, Vol. 304, Springer-Verlag, 1988, pp. 267-278.
-
(1988)
Lecture Notes in Computer Science
, vol.304
, pp. 267-278
-
-
Shimizu, A.1
Miyaguchi, S.2
-
4
-
-
34547242858
-
Cryptographic Protection for Data Processing Systems
-
GOST, Government Committee of the USSR for Standards
-
GOST, Gosudarstvennyi Standard 28147-89, "Cryptographic Protection for Data Processing Systems," Government Committee of the USSR for Standards, 1989.
-
(1989)
-
-
-
5
-
-
85028757148
-
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
-
Advances in Cryptology, ASIACRYPT '91, Springer-Verlag
-
L. Brown, M. Kwan, J. Pieprzyk, and J. Seberry, "Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI," in Advances in Cryptology - ASIACRYPT '91, Lecture Notes in Computer Science, Vol. 739, Springer-Verlag, 1993, pp. 36-50.
-
(1993)
Lecture Notes in Computer Science
, vol.739
, pp. 36-50
-
-
Brown, L.1
Kwan, M.2
Pieprzyk, J.3
Seberry, J.4
-
6
-
-
1842657318
-
Designing S-boxes for Ciphers Resistant to Differential Cryptanalysis
-
Rome, Italy, 15-16 Feb
-
C.M. Adams and S.E. Tavares, "Designing S-boxes for Ciphers Resistant to Differential Cryptanalysis," in Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography, Rome, Italy, 15-16 Feb. 1993, pp. 181-190.
-
(1993)
Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography
, pp. 181-190
-
-
Adams, C.M.1
Tavares, S.E.2
-
8
-
-
84948990100
-
The RC5 Encryption Algorithm
-
Fast Software Encryption, Second International Workshop Proceedings, Springer-Verlag
-
R.L. Rivest, "The RC5 Encryption Algorithm," in Fast Software Encryption, Second International Workshop Proceedings, Lecture Notes in Computer Science, Vol. 1008, Springer-Verlag, 1995, pp. 86-96.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 86-96
-
-
Rivest, R.L.1
-
9
-
-
34547245982
-
-
R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6 Block Cipher, v.1.1, August 20, 1998.
-
R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, "The RC6 Block Cipher," v.1.1, August 20, 1998.
-
-
-
-
10
-
-
0023984964
-
How to Construct Pseudorandom Permutations and Pseudorandom Functions
-
M. Luby and C. Rackoff, "How to Construct Pseudorandom Permutations and Pseudorandom Functions," in SIAM Journal on Computing, Vol. 17, 1988, pp. 373-386.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
11
-
-
84958955327
-
Unbalanced Feistel Networks and Block-Cipher Design
-
Fast Software Encryption, Third International Workshop Proceedings, Springer-Verlag
-
B. Schneier and J. Kelsey, "Unbalanced Feistel Networks and Block-Cipher Design." in Fast Software Encryption, Third International Workshop Proceedings, Lecture Notes in Computer Science, pp. 121-144, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, pp. 121-144
-
-
Schneier, B.1
Kelsey, J.2
-
13
-
-
85011285633
-
The strict avalanche criterion: Spectral properties of boolean functions and an extended definition
-
CRYPTO 88, Springer-Verlag New York, Inc
-
R. Forré, "The strict avalanche criterion: spectral properties of boolean functions and an extended definition," in CRYPTO 88, Lecture Notes in Computer Science, pp. 450-468. Springer-Verlag New York, Inc., 1990.
-
(1990)
Lecture Notes in Computer Science
, pp. 450-468
-
-
Forré, R.1
-
15
-
-
0003278283
-
The microarchitecture of the pentium 4 processor
-
G. Hinton, D. Sager, M. Upton, D. Boggs, D. Carmean, A. Kyker, and P. Roussel, "The microarchitecture of the pentium 4 processor." in Intel Technology Journal, Q1 2001.
-
(2001)
Intel Technology Journal
, vol.Q1
-
-
Hinton, G.1
Sager, D.2
Upton, M.3
Boggs, D.4
Carmean, D.5
Kyker, A.6
Roussel, P.7
-
16
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
Springer-Verlag
-
D. J. Wheeler and R. M. Needham, "TEA, a tiny encryption algorithm," in Lecture Notes in Computer Science, Vol. 1008, pp. 363-369. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 363-369
-
-
Wheeler, D.J.1
Needham, R.M.2
-
17
-
-
0006540774
-
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA
-
Springer-Verlag
-
J.Kelsey, B. Schneier, D. Wagner, "Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA" in Proceedings of the ICICS 97 Conference. Lecture Notes in Computer-Science, Vol. 1334, pp. 233-246. Springer-Verlag, 1997.
-
(1997)
Proceedings of the ICICS 97 Conference. Lecture Notes in Computer-Science
, vol.1334
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
18
-
-
0031599142
-
-
M. Matsumoto, T. Nishimura, Mersenne Twister: A 623-dimensionally equidistributed uniform pseudorandom number generator, ACM Trans. on Modeling and Computer Simulation 8, No. 1, January pp.3-30, 1998
-
M. Matsumoto, T. Nishimura, "Mersenne Twister: A 623-dimensionally equidistributed uniform pseudorandom number generator", ACM Trans. on Modeling and Computer Simulation Vol. 8, No. 1, January pp.3-30, 1998
-
-
-
-
19
-
-
33750264473
-
-
May
-
M. Seredynski, P. Bouvry, "Block cipher based on reversible cellular automata" Next Generation Computing Journal, 23(3), pp. 245-258, May 2005.
-
(2005)
Block cipher based on reversible cellular automata
, vol.23
, Issue.3
, pp. 245-258
-
-
Seredynski, M.1
Bouvry, P.2
-
20
-
-
84992720189
-
Cryptography with cellular automata
-
Advances in Cryptology: Crypto '85 Proceedings
-
S. Wolfram, "Cryptography with cellular automata", Advances in Cryptology: Crypto '85 Proceedings, LNCS, vol. 218, pp 429-432, 1986.
-
(1986)
LNCS
, vol.218
, pp. 429-432
-
-
Wolfram, S.1
-
21
-
-
84958983410
-
A cellular automaton based fast one-way hash function suitable for hardware implementation
-
M. Mihaljevic, Y. Zheng and H. Imai, "A cellular automaton based fast one-way hash function suitable for hardware implementation", Lecture Notes in Computer Science, vol. 1431, pp. 217-233, 1998
-
(1998)
Lecture Notes in Computer Science
, vol.1431
, pp. 217-233
-
-
Mihaljevic, M.1
Zheng, Y.2
Imai, H.3
-
22
-
-
34547326435
-
-
S. Hirose and S. Yoshida, A. one-way hash function based on a two-dimensional cellular automaton, The 20th Symposium on Information Theory and Its Applications (SITA97), Matsuyama, Japan, Dec. 1997, Proc. 1, pp. 213-216.
-
S. Hirose and S. Yoshida, "A. one-way hash function based on a two-dimensional cellular automaton", The 20th Symposium on Information Theory and Its Applications (SITA97), Matsuyama, Japan, Dec. 1997, Proc. vol. 1, pp. 213-216.
-
-
-
-
23
-
-
0028750092
-
Theory and applications of cellular automata in cryptography', IEEE
-
S. Nandi et al. '"Theory and applications of cellular automata in cryptography'", IEEE Transactions on Computers, Vol. 43, pp. 1346-1357, 1994
-
(1994)
Transactions on Computers
, vol.43
, pp. 1346-1357
-
-
Nandi, S.1
-
24
-
-
33750272503
-
An improved key stream generator based on the programmable cellular automata
-
M. J. Mihaljevic "'An improved key stream generator based on the programmable cellular automata'", Lecture Notes in Computer Science, Vol. 1334, pp. 181-191, 1997
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 181-191
-
-
Mihaljevic, M.J.1
-
26
-
-
0347666758
-
-
G. Marsaglia, W. W. Tsang 'Some Difficult-to-pass Tests of Randomness', Journal of Statistical Software, 7, 2002, Issue 3
-
G. Marsaglia, W. W. Tsang '"Some Difficult-to-pass Tests of Randomness'", Journal of Statistical Software, Volume 7, 2002, Issue 3
-
-
-
-
27
-
-
34547329200
-
-
A. L. Rukhin, J. Soto, J. R. Nechvatal, M. Smid, E. B. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, N. A. Heckert, J. F. Dray, S. Vo 'A Statistical Test Suite for Random, and Pseudorandom Number Generators for Cryptographic Application' NIST SP 800-22, U.S. Government Printing Office, Washington:2000, CODEN: NSPUE2
-
A. L. Rukhin, J. Soto, J. R. Nechvatal, M. Smid, E. B. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, N. A. Heckert, J. F. Dray, S. Vo "'A Statistical Test Suite for Random, and Pseudorandom Number Generators for Cryptographic Application'" NIST SP 800-22, U.S. Government Printing Office, Washington:2000, CODEN: NSPUE2
-
-
-
|