E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
Google Scholar
T.W. Cusick and M.C. Wood, “The REDOC-II Cryptosystem,“ Advances in Cryptology-CRYPTO '90 Proceedings, Springer-Verlag, 1991, pp. 545–563.
Google Scholar
J. Deamen, R. Govaerts, and J. Vandewalle, “Block Ciphers Based on Modular Arithmetic,” Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography, Rome, Italy, 15–16 Feb 1993, pp. 80–89.
Google Scholar
J.-H. Evertse, “Linear Structures in Blockciphers,” Advances in Cryptology-EUROCRPYT '87, Springer-Verlag, 1988, pp. 249–266.
Google Scholar
H. Feistel, “Cryptography and Computer Privacy,” Scientific American, v. 228, n. 5, May 73, pp. 15–23.
Google Scholar
GOST 28147-89, “Cryptographic Protection for Data Processing Systems,” “Cryptographic Transformation Algorithm,” Government Standard of the U.S.S.R., Inv. No. 3583, UDC 681.325.6:006.354. (in Russian)
Google Scholar
X. Lai, J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis,” Advances in Cryptology-EUROCRYPT '91 Proceedings, Springer-Verlag, 1991, pp. 17–38.
Google Scholar
J.L. Massey and X. Lai, “Device for Converting a Digital Block and the Use Thereof,” International Patent PCT/CH91/00117, 16 May 1991.
Google Scholar
J.L. Massey and X. Lai, “Device for the Conversion of a Digital Block and Use of Same,” U.S. Patent 5,214,703, 25 May 1993.
Google Scholar
M. Matsui, “Linear Cryptanalysis Method for DES Cipher,” Advances in Cryptology-CRYPTO '93 Proceedings, Springer-Verlag, 1994, in preparation.
Google Scholar
R.C. Merkle, “Fast Software Encryption Functions,” Advances in Cryptology-CRYPTO '90 Proceedings, Springer-Verlag, 1991, pp. 476–501.
Google Scholar
R.C. Merkle, “Method and Apparatus for Data Encryption,” U.S. Patent 5,003,597, 26 Mar 1991.
Google Scholar
S. Miyaguchi, “The FEAL-8 Cryptosystem and Call for Attack,” Advances in Cryptology-CRYPTO '89 Proceedings, Springer-Verlag, 1990, pp. 624–627.
Google Scholar
S. Miyaguchi, “Expansion of the FEAL Cipher,” NTT Review, v. 2, n. 6, Nov 1990.
Google Scholar
S. Miyaguchi, “The FEAL Cipher Family,” Advances in Cryptology-CRYPTO '90 Proceedings, Springer-Verlag, 1991, pp. 627–638.
Google Scholar
National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS Publication 46, Jan 1977.
Google Scholar
National Institute of Standards and Technology, “Clipper Chip Technology,” 30 Apr 1993.
Google Scholar
RSA Laboratories, Answers to Frequently Asked Questions About Today's Cryptography, Revision 2.0, RSA Data Security Inc., 5 Oct 1993.
Google Scholar
B. Schneier, “Data Guardians,” MacWorld, Feb 1993, 145–151.
Google Scholar
B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.
Google Scholar
J.L Smith, The Design of Lucifer, A Cryptographic Device for Data Communication, RC 3326, White Plains: IBM Research.
Google Scholar
M.J. Weiner, “Efficient DES Key Search,” Advances in Cryptology-CRYPTO '93 Proceedings, Springer-Verlag, in preparation.
Google Scholar
M.C. Wood, “Method of Cryptographically Transforming Electronic Digital Data from One Form to Another,” U.S. Patent 5,003,596, 26 Mar 1991.
Google Scholar