34
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Recent Trends in Applied Cryptology

&
Pages 119-128 | Published online: 26 Mar 2015

REFERENCES

  • D Kahn, The Code breakers, Macmillan Publishing Company, New York, 1967.
  • H Beker & F Piper, Cipher Systems: The Protection of Communication, Northwood Booker, London, 1982.
  • William F Friedman, Elements of Cryptanalysis, A Cryptographic Series, Aegean Park Press, California, 1976.
  • C E Shannon, Mathematical theory of communication, The Bell System Technical Journal, vol 27, pp-379–423, 623–656, 1948.
  • C E Shannon, Communication theory of secrecy system, The Bell System Technical Journal, 1949.
  • A Menezes, P Oorschot & S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
  • Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, New York, 1996.
  • J Daemen, L Knudsen & V Rijmen, The block cipher Square, in Fast Software Encryption '97, pp 149–165, Springer-Verlag, 1997.
  • J Daemen & V Rijmen, AES proposal: Rijndael, in AES Round 1 Technical Evaluation CD-1: Documentation, NIST, August 1998
  • Richard A Mollin, RSA and Public Key Cryptography, CRC Press, Nov 2002.
  • Bruce Schneier, Secret & Lies: Digital Security in a Networked World, John Wiley & Sons Inc, 2000.
  • T Parsons, Voice and Speech Processing, McGraw Hill, New York, 1987.
  • J D Markel & A H Gray, Linear Prediction of Speech, Springer-Verlag, 1980.
  • H J Beker & F C Piper, Secure Speech Communication, Academic Press, 1985.
  • S Katzenbeizzer & F A P Petitcolas (eds), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, 2000.
  • S K Pal, P K Saxena & S K Muttoo, Future of audio steganography, Proceedings of the International conference on Steganography (STEG-02), Kyoto, Japan 11–12 July 2002.
  • S K Pal and C E Veni Madhavan, Investigating steganographic communications, Proceedings of 33rd Midterm Symposium of the IETE on Information Security (to be published), New Delhi, 2002.
  • N Navid Neimin, Lecture notes in Quantum Computations, Springer-Verlag, 2002, http://www.ccmr.Cornell.edu/umeemin/acoomp/es483.html.
  • P P Chaudhuri, D R Chowdhury, S Nandi, S Chattopadhyay, Additive Cellular Automata: Theory and Applications Vol-1, IEEE Computer Society Press, California, 1997.
  • Ian F Blake & N Smart, Elliptic Curves in Cryptography, Cambridge Univ.
  • M Naor & A Shamir, Visual cryptography, in Lecture Notes in Computer Science, Proceedings of Eurocrypt '94.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.