-
1
-
-
0003508568
-
-
National Bureau of standards, Federal Information processing standards Publication 46, US Government Printing Office, Washington, D.C
-
National Bureau of standards. "Data Encryption Standard," Federal Information processing standards Publication 46, US Government Printing Office, Washington, D.C., 1977.
-
(1977)
Data Encryption Standard
-
-
-
3
-
-
0003851399
-
-
John Wiley & Sons, Inc, New York, second edition
-
B. Schneier, "Applied Cryptography - Protocols, algorithms, and source code in C," John Wiley & Sons, Inc., New York, second edition, 1996.
-
(1996)
Applied Cryptography - Protocols, algorithms, and source code in C
-
-
Schneier, B.1
-
4
-
-
51749122588
-
-
R.L. Rivest, M.J.B. Robshaw, R.Sidney, and Y.L. Yin, The RC6TM Block cipher, v. 1.1, August 20, 1998. Available at ww.rsa.com/rsalabs/ aes/.
-
R.L. Rivest, M.J.B. Robshaw, R.Sidney, and Y.L. Yin, "The RC6TM Block cipher," v. 1.1, August 20, 1998. Available at ww.rsa.com/rsalabs/ aes/.
-
-
-
-
5
-
-
0001826463
-
RC5 Encryption Algorithm
-
Jan
-
R.L. Rivest, "RC5 Encryption Algorithm," Dr Dobbs Journal, vol. 226, pp. 146-148, Jan. 1995.
-
(1995)
Dr Dobbs Journal
, vol.226
, pp. 146-148
-
-
Rivest, R.L.1
-
7
-
-
0004102023
-
-
RSA Security, Self Evaluation Report
-
RSA Security. "The RC6 Block cipher," Self Evaluation Report.
-
The RC6 Block cipher
-
-
-
9
-
-
51749119618
-
Some Comments
-
on the, available at
-
R.L. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Yin, "Some Comments on the First Round AES Evaluation of RC6," available at http://csrc.nist.gov/encryption/aes/round1/pubcmnts.htm.
-
First Round AES Evaluation of RC6
-
-
Rivest, R.L.1
Robshaw, M.J.B.2
Sidney, R.3
Yin, Y.L.4
-
11
-
-
51749095856
-
Implementation of RC5 Block Cipher Algorithm for Digital Images
-
15-17 June, Brno, The Czech Republic
-
H.H. Ahmed, H.M. Kalash, and O.S. Farag Allah, "Implementation of RC5 Block Cipher Algorithm for Digital Images". Proceeding of The 5th Central European Conference on Cryptography (MoraviaCrypt 2005), 15-17 June, 2005, Brno, The Czech Republic.
-
(2005)
Proceeding of The 5th Central European Conference on Cryptography (MoraviaCrypt
-
-
Ahmed, H.H.1
Kalash, H.M.2
Farag Allah, O.S.3
-
14
-
-
85008921093
-
Chaos-based encryption for digital images and videos
-
chapter 4, February
-
S. Li, G. Chen and X. Zheng, "Chaos-based encryption for digital images and videos," chapter 4 in Multimedia Security Handbook, February 2004.
-
(2004)
Multimedia Security Handbook
-
-
Li, S.1
Chen, G.2
Zheng, X.3
-
16
-
-
34247578758
-
Chaos-based image encryption
-
Eduardo Bayro-Corrochano, editor, Springer-Verlag, Heidelberg, April
-
Y. Mao and G. Chen, "Chaos-based image encryption," in Eduardo Bayro-Corrochano, editor, Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neural Computing and Robotics. Springer-Verlag, Heidelberg, April 2004.
-
(2004)
Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neural Computing and Robotics
-
-
Mao, Y.1
Chen, G.2
-
17
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic Cat maps
-
Y. Mao, G. Chen and S. Lian, "A symmetric image encryption scheme based on 3D chaotic Cat maps," Chaos, Solitons and Fractals 21, pages 749-761, 2004.
-
(2004)
Chaos, Solitons and Fractals
, vol.21
, pp. 749-761
-
-
Mao, Y.1
Chen, G.2
Lian, S.3
-
18
-
-
51749090360
-
-
Business Software Alliance, Matt Blaze et al., Minimum key length for symmetric ciphers to provide adequate commercial security, available at: http://www.bsa.org/bsa/cryptologists.html
-
Business Software Alliance, Matt Blaze et al., "Minimum key length for symmetric ciphers to provide adequate commercial security," available at: http://www.bsa.org/bsa/cryptologists.html
-
-
-
-
19
-
-
84890522850
-
Communication theory of secrecy system
-
C.E. Shannon, "Communication theory of secrecy system," Bell Syst Tech J 1949, 28:656-715.
-
(1949)
Bell Syst Tech J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
|