Rueppel, Analysis and Design of Stream Ciphers, New York, NY, Springer-Verlag, 1986. Adleman, “A Method for obtaining digital Signatures and Public-Key Cryptosystems”, Communications of the ACM 21 (1978), pp. Wild, “Digital Signatures”, Contemporary Cryptology (Ed.
DI-5.1, International Academic Publishers, July, 1988.Ĭ. Massey, “Some Connections between Scramblers and Invertible Automata”, Proceedings of Beijing International Workshop on Information Theory (BIWIT'88), p. Massey), Vol.1, Hartung-Gorre Verlag, Konstanz, 1992. Lai, “On the Design and Security of Block Ciphers”, ETH series in Information Processing (Ed. Jueneman, “A High-Speed Manipulation Detection Code”, Advances in Cryptology-CRYPTO'86, Proceedings, pp. ISO/IEC 9797, “Data cryptographic techniques - Data integrity mechanism using a cryptographic check function employing a block cipher algorithm”, International Organization for Standardization, 1-st. ISO 8731-1, “Banking - Approved Algorithms for Message Authentication - Part 1: DEA”, International Organization for Standardization, 1987. Golomb, Shift Register Sequences, Holden-Day, San Francisco, 1967. El Gamal, “A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms”, IEEE Trans. Yvo Desmedt, “Unconditional secure authentication schemes and practical and theoretical consequences”, Advances in Cryptology-CRYPTO'85, LNCS 218 pp. Damgaard, “A Design Principle for Hash Functions”, Advances in Cryptology-CRYPTO'89, LNCS 435, pp. Brassard, Modern Cryptology, LNCS 325, Springer-Verlag, 1988.ĭata Encryption Standard, FIPS PUB 46, National Tech. ANSI X9.9-1986, Financial Institution Message Authentication (Wholesale), American Bankers Association, Washington DC, 1986.