Coppersmith et al, A proposed mode for triple-DES encryption, IBM J. Research & Development, Mar 96, vol. 40, Issue 2, pp. 253-262.* |
Schneier, Applied Cryptography, 2nd Edition, Oct. 18, 1995, pp. 319-325.* |
FIPS PUB 46-2 Dec. 30, 1993—“Data Encryption Standard (DES)”. |
FIPS PUB 81—Dec. 2, 1980—DES Modes Of Operation. |
Information Processing Letters 41, vol. 41, No.2 —Feb. 14, 1992, “On Immunity Against Biham . . . Cryptanalysis”, pp. 77-80. |
Fast Software Encryption—Cambridge Security Workshop—Dec. 9-Nov. 1993, “On Modes Of Operation”—Feb. 22, 1994 by E. Biham—pp. 116-120. |
USENIX Assoc., Proc. of the Summer '94 USENIX Conf.—Jun.6-Oct. 1994, “Key Management In An Encrypting File System” by M. Blaze, pp. 27-35. |
Advances In Cryptology-CRYPTO '90—“The REDOC II Cryptosystem” by T.W. Cusick et al—pp. 545-563. |
Fast Software Encryption—Cambridge Security Workshop—Dec.9-Nov. 1993, “A New Approach To Block Cipher Design” by J. Daemen et al, pp. 18-32 . |
Fast Software Encryption—Cambridge Security Workshop—Dec. 9-Nov., 1993, “VINO: A Block Cipher . . . Permutations” by A. DiPorto, pp. 205-210. |
Fast Software Encryption—Cambridge Security Workshop—Dec. 9-Nov. 1993, “Fast Block Cipher Proposal” by B.S. Kaliski, Jr. et al, pp. 33-40. |
IEICE Trans.Fundamentals, vol. E77-A, No. 8, Aug. 1994, “Dynamic Swapping Schemes . . . Cryptanalysis” by T. Kaneko et al, pp. 1328-1336. |
IEICE Trans.Fundamentals, vol. E76-A, No. 1, Jan. 1993, “How To Strengthen DES-like . . . Cryptanalysis” by K.Koyama et al, pp. 63-69. |
Fast Software Encryption, Cambridge Security Workshop, Dec. 9-Nov. 1993, “SAFER K-64: A Byte-Oriented . . . Algorithm” by J.Massey,pp. 1-17. |
Journal of Cryptology-1995- “Provable Security Against a Differential Attack” by K. Nyberg et al, pp. 27-37. |
Dr. Dobb's Journal, Jan. 1995—“The RC5 Encryption Algoithm”, by R. L. Rivest, pp. 146 and 148. |
Fast Software Encryption, Cambridge Security Workshop, Dec. 9-Nov. 1993, “Performance of Symmetric Ciphers . . . Functions” by M.Roe, pp. 83-89. |
Applied Cryptography, Second Edition, 1996, Chapter 19.3 RSA, by B. Schneier, pp. 466-474. |
Fast Software Encryption, Cambridge Security Workshop, Dec. 9-Nov. 1993, “Description of a New . . . Cipher (Blowfish)” by B.Schneier,pp. 191-204. |
Dr. Dobb's Journal, Apr. 1994-13 “The Blowfish Encryption ALgorithm” by B. Schneier, pp. 38,40,98-99. |
Dr. Dobb's Journal, Dec. 1993, “The IDEA Encryption Algorithm” by B. Schneier—pp. 50,52,54,56,105-107. |
Advances in Cryptology—CRYPTO '94—Aug. 21-25, 1994, “Pitfalls Designing . . . Abstract)”, by J.Seberry et al, pp. 383-396. |