applied cryptography - protocols, algorithms, and source code in c

8389 997 d macmillan single chip encrypts data at

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Data Encryption Standard a Group? (Results of Cycling Experiments on DES),” Journal of Cryptology, v. 1, n. 1, 1988, pp. 3–36. 810. B.S. Kaliski and M.J.B. Robshaw, “Fast Block Cipher Proposal,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 33–40. 811. B.S. Kaliski and M.J.B. Robshaw, “Linear Cryptanalysis Using Multiple Approximations,” Advances in Cryptology—CRYPTO ’94 Proceedings, Springer–Verlag, 1994, pp. 26–39. 812. B.S. Kaliski and M.J.B. Robshaw, “Linear Cryptanalysis Using Multiple Approximations and FEAL,” K.U. Leuven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 813. R.G. Kammer, statement before the U.S. government Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, 29 Apr 1993. 814. T. Kaneko, K. Koyama, and R. Terada, “Dynamic Swapping Schemes and Differential Cryptanalysis, Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 292–301. 815. T. Kaneko, K. Koyama, and R. Terada, “Dynamic Swapping Schemes and Differential Cryptanalysis,” Transactions of the Institute of Electronics, Information, and Communication Engineers, v. E77–A, n. 8, Aug 1994, pp. 1328–1336. 816. T. Kaneko and H. Miyano, “A Study on the Strength Evaluation of Randomized DES–Like Cryptosystems against Chosen Plaintext Attacks,” Proceedings of the 1993 Symposium on Cryptography and Information Security (SCIS 93), Shuzenji, Japan, 28–30 Jan 1993, pp. 15C.1–10. 817. J. Kari, “A Cryptosystem Based on Propositional Logic,” Machines, Languages, and Complexity: 5th International Meeting of Young Computer Scientists, Selected Contributions, Springer–Verlag, 1989, pp. 210–219. 818. E.D. Karnin, J.W. Greene, and M.E. Hellman, “On Sharing Secret Systems,” IEEE Transactions on Information Theory, v. IT–29, 1983, pp. 35–41. 819. F.W. Kasiski, Die Geheimsch...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online