Цитирование: | 1. Shannon С. Communication Theory of secrecy systems // Bell System Technical J. 1949. Vol. 28. P. 656-715.
2. DIFFIE W., Hellman M. New directions in cryptography // IEEE Trans, on Information Theory. 1976. Vol. 22 (6). P. 644-654.
3. Feistel H. Cryptography and computer privacy // Sci. American. 1973. Vol. 228, N 5. P. 15-23.
4. National Bureau of Standards. Data encryption standard // Federal Information Proc. Standard (FIPS). 1977. Vol. 81.
5. Advanced Encryption Algorithm (AES) Development Effort // 1997-2000.
6. Daemen J., Rumen V. The Rijndael block cipher // AES Submission. 1999.
7. BIHAM E., Shamir A. Differential cryptanalysis of the full 16-round DES // Proc. of Crypto'92, LNCS. В.; N.Y.: Springer-Verl., 1993. Vol. 740. P. 487-496.
8. Matsui M. Linear cryptanalysis method for DES cipher // Proc. of Eurocrypt'93, LNCS. В.; N.Y.: Springer-Verb, 1994. Vol. 765. P. 205-218.
9. Knudsen L. Truncated and higher order differentials // Proc. of Fast Software Encryption'94, LNCS. В.; N.Y.: Springer-Verb, 1995. Vol. 1008. P. 196-211.
10. Wagner D. The boomerang attack // Proc. of Fast Software Encryption'99, LNCS. В.; N.Y.: Springer-Verb, 1999. Vol. 1636. P. 156-170.
11. BIHAM E., BIRYUKOV A., Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials // Proc. of Eurocrypt'99, LNCS. В.; N.Y.: Springer-Verb, 1999. Vol. 1592. P. 12-23.
12. Daemen J., Knudsen L., Rumen V. The block cipher square // Proc. of Fast Software Encryption'97, LNCS. В.; N.Y.: Springer-Verl., 1997. Vol. 1267. P. 149-165.
13. Knudsen L., Wagner D. Integral cryptanalysis // Proc. of Fast Software Encryption'02, LNCS. В.; N.Y.: Springer-Verb, 2002. Vol. 2365. P. 629-632.
14. Jakobsen Т., Knudsen L. The interpolation attack on block ciphers // Proc. of Fast Software Encryption'97, LNCS. В.; N.Y.: Springer-Verl., 1997. Vol. 1267. P. 28-40.
15. New European Schemes for Signatures, Integrity, and Encryption // Deliverables of the NESSIE Project. 2003. http://www.cosic.esat.kuleuven.ac.be/nessie
16. CRYPTREC Project // 2000-2002. http://www.ipa.go.jp/security/enc/CRYPTREC
|