Author:
Daemen Joan,Govaerts René,Vandewalle Joos
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. Journal, Vol. 28, pp. 656–715, 1949.
2. B. Harris, Probability Distributions Related to Random Mappings, Annals of Mathematical Statistics, 31 (1959), 1045–1062.
3. E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology (1991) 4: 3–72.
4. D. E. Denning, Cryptography and Data Security, Addison-Wesley, Reading, MA, 1982.
5. Lecture notes in Computer Science, vol. 304;I. Damgård,1988
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. References;Applied Cryptography, Second Edition;2015-10-09
2. ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware;Cryptographic Hardware and Embedded Systems, CHES 2010;2010
3. A new approach to block cipher design;Fast Software Encryption;1994
4. Design principles for dedicated hash functions;Fast Software Encryption;1994
5. Information authentication: Hash functions and digital signatures;Computer Security and Industrial Cryptography;1993