Author:
Ali Md Rasid,Roy Chowdhury Dipanwita
Reference34 articles.
1. Aoki, K., Ichikawa, T., Kanda, M. , Matsui, M., Moriai, S., Nakajima, J., & Tokita, T. (2000). Camellia: A 128-bit block cipher suitable for multiple platforms–design and analysis. In International Workshop on Selected Areas in Cryptography (pp. 39–56). Springer.
2. Banik, S., Bogdanov, Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., & Regazzoni, F. (2015). Midori: A block cipher for low energy. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 411–436). Springer.
3. Barker, E., Feldman, L., & Witte, G. (2015). Recommendation for random number generation using deterministic random bit generators, tech. rep., National Institute of Standards and Technology.
4. Barreto, P., Rijmen, V., et al. (2000). The whirlpool hashing function. In First open NESSIE Workshop (Vol. 12, p. 14). Leuven, Belgium.
5. Barreto, P. S. (2000). The anubis block cipher. NESSIE.