Number | Date | Country | Kind |
---|---|---|---|
9-105609 | Apr 1997 | JP |
Number | Name | Date | Kind |
---|---|---|---|
4074066 | Ehrsam et al. | Feb 1978 | A |
4078152 | Tuckerman | Mar 1978 | A |
4157454 | Becker | Jun 1979 | A |
4229818 | Matyas | Oct 1980 | A |
4447672 | Nakamura | May 1984 | A |
4944006 | Citta | Jul 1990 | A |
5442705 | Miyano | Aug 1995 | A |
Number | Date | Country |
---|---|---|
4016203 | Nov 1991 | DE |
012974 | Jul 1980 | EP |
752770 | Jan 1997 | EP |
9118460 | Nov 1991 | WO |
Entry |
---|
Schneier, Applied Cryptography, John Wiley, Oct. 1995.* |
Denning, Cryoptographic and Data Security, 1982.* |
Handbook of Applied Cryptography, CRC Press, 1997.* |
Cryptanalysis of Multiple Modes of Operation, by E. Biham, Processings of the Conference on the Theory and Applications of Cryptology, DE, Berlin, Springer, vol. CONF. 4, 1994, pp. 278-292. |