applied cryptography - protocols, algorithms, and source code in c

594 p gallay and e depret a cryptography

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: , John Wiley & Sons, 1989. 436. M. Davio, Y. Desmedt, M. Fosseprez, R. Govaerts, J. Hulsbrosch, P. Neutjens, P. Piret, J.–J. Quisquater, J. Vandewalle, and S. Wouters, “Analytical Characteristics of the Data Encryption Standard,” Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, 1984, pp. 171–202. 437. M. Davio, Y. Desmedt, J. Goubert, F. Hoornaert, and J.–J. Quisquater, “Efficient Hardware and Software Implementation of the DES,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 144–146. 438. M. Davio, Y. Desmedt, and J.–J. Quisquater, “Propagation Characteristics of the DES,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, 62–73. 439. D. Davis, R. Ihaka, and P. Fenstermacher, “Cryptographic Randomness from Air Turbulence in Disk Drives,” Advances in Cryptology—CRYPTO ’94 Proceedings, Springer–Verlag, 1994, pp. 114–120. 440. J.A. Davis, D.B. Holdbridge, and G.J. Simmons, “Status Report on Factoring (at the Sandia National Laboratories),” Advances in Cryptology: Proceedings of Crypto 84, Springer–Verlag, 1985, pp. 183–215. 441. R.M. Davis, “The Data Encryption Standard in Perspective,” Computer Security and the Data Encryption Standard, National Bureau of Standards Special Publication 500–27, Feb 1978. 442. E. Dawson and A. Clark, “Cryptanalysis of Universal Logic Sequences,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, to appear. 443. M.H. Dawson and S.E. Tavares, “An Expanded Set of Design Criteria for Substitution Boxes and Their Use in Strengthening DES–Like Cryptosystems,” IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, Victoria, BC, Canada, 9–10 May 1991, pp. 191–195. 444. M.H. Dawson and S.E. Tavares, “An Expanded Set of S–Box Design Criteria Based on Information Theory and Its Relation to Differential–like Attacks,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verla...
View Full Document

Ask a homework question - tutors are online