0
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Secret Error-Correcting Codes (SECC)

&
Pages 362-367 | Published online: 02 Jun 2015

REFERENCES

  • C E Shahnon, A mathematical theory of communication, Bell Syst Tech J, vol 27 pp 379–423 (Part I), 623–656 (Part II), July 1948.
  • Dorothy E, Dennning, Cryptography and Data security, Addisons Wesley, 1982.
  • Whitfield Diffie & Martin E Hellman, New directorions in cryptography, IEEE Trans Inform Theory, vol IT-22, pp 644–654, Nov 1976.
  • Whitfield Diffie & Martin E Hellaman, Exhaustive cryptanalysis of the NBS data encryption standard, Computer, pp 74–84, June 1977.
  • Data Enncryption Standard, FIPS PUB 46, National Bureau of Standards, Washington, DC, Jan 1977.
  • M E Smid & D K Branstad, The data encryption standard: past and future, Proc IEEE, May 1988.
  • Charles C, Wood, Future application of cryptography, Proc Symp Security and Privacy, pp 70–74, Apr 1981.
  • R J McEliece, A public-key cryptosystem based on algebraic doding theory, DSN Progress Report, Jet Propulsion Laboratory, CA, Jan & Feb 1978, pp 42–44.
  • E R Berlekamp, R J McEliece, & H C A van Tilborg, On the inherent intractibility of certain coding problems, IEEE Trans Inform Theory, vol IT-24, pp 384–386, May 1978.
  • T R N Rao, Cryptosystems using algebraic codes, IEEE International Symp Inform Theory, Brighton, England, June, pp 146, 1985.
  • Tzonelih Hwang, Secret error-correcting codes and algebraic-code cryptosystems, PhD dissertation, Univ of SW Louisiana, Summer 1988
  • Shu Lin & Daniel J Costello Jr, Error Control Coding: Fundamentals and Applications, Prentice-Hall, 1983.
  • W Wesley Peterson & E J Weldon, Jr, Error-Correcting Codes, Second Edition, The MIT Press, 1972.
  • F P Preparata, A Class of optimum nonlinear double-error-correcting codes, Inform & Control, vol 13, pp 378–400, 1968.
  • F J MacWilliams & J J A Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, 1977.
  • S Even & O Goldreich, On the power of cascade ciphers, Advances in Cryptology CRYPTO '83, Springler Verlag, pp 43–50.
  • J Massey, A Cascade cipher on being the first is important, tentative title, Rump section paper on CRYPTO '88, Santa Barbara, California, 1988.
  • C H Meyer & S M Matyas, Cryptography, A New Dimension in Computer Data Security, John Wiley & Sons, Inc, 1982.
  • T E Moore & S E Tavares, A Layered Approach to the Design of Private Key Cryptosystems, Advances in Crytology CRYPTO '85, (A M Odlyzko, Ed) New York, Springlaer Verlag, 1985.
  • T R N Rao & K H Nam, A Private-Key Algebraic-Coded, Cryptosystem, Advances in Cryptology CRYPTO ‘86’ (AM Odlyzko, Ed) New York, Springler Verlag, pp 25–48, 1987.
  • P Wayner, “A Redundancy Reducuig Cipher, Cryptologia, vol XII, p 107, April 1988.
  • H Feistel, Cryptography and computer privacy, Scientific American, vol 228, pp 15–23, May 1973.
  • J B Kam & G I Davida, Structured design of substitution-permutation encryption networks, IEEE Trans Computers, vol C-28, pp 747–753, Oct 1979.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.