REFERENCES
- C E Shahnon, A mathematical theory of communication, Bell Syst Tech J, vol 27 pp 379–423 (Part I), 623–656 (Part II), July 1948.
- Dorothy E, Dennning, Cryptography and Data security, Addisons Wesley, 1982.
- Whitfield Diffie & Martin E Hellman, New directorions in cryptography, IEEE Trans Inform Theory, vol IT-22, pp 644–654, Nov 1976.
- Whitfield Diffie & Martin E Hellaman, Exhaustive cryptanalysis of the NBS data encryption standard, Computer, pp 74–84, June 1977.
- Data Enncryption Standard, FIPS PUB 46, National Bureau of Standards, Washington, DC, Jan 1977.
- M E Smid & D K Branstad, The data encryption standard: past and future, Proc IEEE, May 1988.
- Charles C, Wood, Future application of cryptography, Proc Symp Security and Privacy, pp 70–74, Apr 1981.
- R J McEliece, A public-key cryptosystem based on algebraic doding theory, DSN Progress Report, Jet Propulsion Laboratory, CA, Jan & Feb 1978, pp 42–44.
- E R Berlekamp, R J McEliece, & H C A van Tilborg, On the inherent intractibility of certain coding problems, IEEE Trans Inform Theory, vol IT-24, pp 384–386, May 1978.
- T R N Rao, Cryptosystems using algebraic codes, IEEE International Symp Inform Theory, Brighton, England, June, pp 146, 1985.
- Tzonelih Hwang, Secret error-correcting codes and algebraic-code cryptosystems, PhD dissertation, Univ of SW Louisiana, Summer 1988
- Shu Lin & Daniel J Costello Jr, Error Control Coding: Fundamentals and Applications, Prentice-Hall, 1983.
- W Wesley Peterson & E J Weldon, Jr, Error-Correcting Codes, Second Edition, The MIT Press, 1972.
- F P Preparata, A Class of optimum nonlinear double-error-correcting codes, Inform & Control, vol 13, pp 378–400, 1968.
- F J MacWilliams & J J A Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, 1977.
- S Even & O Goldreich, On the power of cascade ciphers, Advances in Cryptology CRYPTO '83, Springler Verlag, pp 43–50.
- J Massey, A Cascade cipher on being the first is important, tentative title, Rump section paper on CRYPTO '88, Santa Barbara, California, 1988.
- C H Meyer & S M Matyas, Cryptography, A New Dimension in Computer Data Security, John Wiley & Sons, Inc, 1982.
- T E Moore & S E Tavares, A Layered Approach to the Design of Private Key Cryptosystems, Advances in Crytology CRYPTO '85, (A M Odlyzko, Ed) New York, Springlaer Verlag, 1985.
- T R N Rao & K H Nam, A Private-Key Algebraic-Coded, Cryptosystem, Advances in Cryptology CRYPTO ‘86’ (AM Odlyzko, Ed) New York, Springler Verlag, pp 25–48, 1987.
- P Wayner, “A Redundancy Reducuig Cipher, Cryptologia, vol XII, p 107, April 1988.
- H Feistel, Cryptography and computer privacy, Scientific American, vol 228, pp 15–23, May 1973.
- J B Kam & G I Davida, Structured design of substitution-permutation encryption networks, IEEE Trans Computers, vol C-28, pp 747–753, Oct 1979.