REFERENCES
- D Kahn, The Code breakers, Macmillan Publishing Company, New York, 1967.
- H Beker & F Piper, Cipher Systems: The Protection of Communication, Northwood Booker, London, 1982.
- William F Friedman, Elements of Cryptanalysis, A Cryptographic Series, Aegean Park Press, California, 1976.
- C E Shannon, Mathematical theory of communication, The Bell System Technical Journal, vol 27, pp-379–423, 623–656, 1948.
- C E Shannon, Communication theory of secrecy system, The Bell System Technical Journal, 1949.
- A Menezes, P Oorschot & S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
- Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, New York, 1996.
- J Daemen, L Knudsen & V Rijmen, The block cipher Square, in Fast Software Encryption '97, pp 149–165, Springer-Verlag, 1997.
- J Daemen & V Rijmen, AES proposal: Rijndael, in AES Round 1 Technical Evaluation CD-1: Documentation, NIST, August 1998
- Richard A Mollin, RSA and Public Key Cryptography, CRC Press, Nov 2002.
- Bruce Schneier, Secret & Lies: Digital Security in a Networked World, John Wiley & Sons Inc, 2000.
- T Parsons, Voice and Speech Processing, McGraw Hill, New York, 1987.
- J D Markel & A H Gray, Linear Prediction of Speech, Springer-Verlag, 1980.
- H J Beker & F C Piper, Secure Speech Communication, Academic Press, 1985.
- S Katzenbeizzer & F A P Petitcolas (eds), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, 2000.
- S K Pal, P K Saxena & S K Muttoo, Future of audio steganography, Proceedings of the International conference on Steganography (STEG-02), Kyoto, Japan 11–12 July 2002.
- S K Pal and C E Veni Madhavan, Investigating steganographic communications, Proceedings of 33rd Midterm Symposium of the IETE on Information Security (to be published), New Delhi, 2002.
- N Navid Neimin, Lecture notes in Quantum Computations, Springer-Verlag, 2002, http://www.ccmr.Cornell.edu/umeemin/acoomp/es483.html.
- P P Chaudhuri, D R Chowdhury, S Nandi, S Chattopadhyay, Additive Cellular Automata: Theory and Applications Vol-1, IEEE Computer Society Press, California, 1997.
- Ian F Blake & N Smart, Elliptic Curves in Cryptography, Cambridge Univ.
- M Naor & A Shamir, Visual cryptography, in Lecture Notes in Computer Science, Proceedings of Eurocrypt '94.