Kohl, J T, “The use of Encryption in Kerberos for Network Authentication”, Advances in Cryptology, Proceedings, Santa Barbara, CA, Aug. 20-24, 1989, XP 000135668, pp. 35-43. |
Biham, E, “Cryptanalysis of Multiple Modes of Operation”, 4th International Conference on the Theory and Applications of Cryptology, Proceedings, Advances in Cryptology, XP 00527601, pp. 278-292. |
Ehrsam, W F et al, “Fractional Block-Size Cipher”, IBM Technical Disclosure Bulletin, Jul. 1979, vol. 22, No. 2, Jun. 1979, XP 002051943, pp. 640-642. |
Jansen, C J A, Investigations on Non-Linear Streamcipher Systems: Construction and Evaluation Method, PhD. Thesis, (1989), pp. 22-28. |
Matyas, S M et al, Message Authentication with Manipulation Detection Codes; Proceedings IEEE (1983) Symposium on Security and Privacy, pp. 66-365. |
Kohl, J T, The Use of Encryption in Kerberos for Network Authentication, Advances in Cryptology, CRYPTO 1989, LNCS, vol. 435, Springer Verlag, 1990, pp. 36-39. |
Schneider, B, “Angewandte Kryptographie”, Addison-Wesley Publishing Company, Bonn, ISBN 3-89319-854-7, (1996), pp. 227-246. |