7
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Efficient Design of ENCA Based Cipher System

&
Pages 163-173 | Published online: 26 Mar 2015

REFERENCES

  • A Sinkov, Elementary Cryptanalysis, Math Assoc, 1966.
  • G E Mellen, Cryptography, Computers and Common Sense, NCC, vol 42, pp 569–579, 1973.
  • E Sam, Musical Cryptography, Cryptologia, vol 3, pp 193–201, October 1979.
  • P P Choudhuri, D R Choudhuri, S Nandi & S Chattopadhyay, Additive Cellular Automata: Theory and Application, vol I, IEEE CS, 1997.
  • D Kahn, The Codebreaker, Macmillan Co, Newyork, 1967.
  • C E Shannon, Comm Theory of Secrecy Systems, Tech Rep 28, Bell Syst Tech J, 1949.
  • H Feistel, Cryptography and Computer Privacy, Sci Am, vol 228, pp 15–23. May 1973.
  • F P 46, Data Encryption Standard, January 1967.
  • S Pohling & M Hellman, An Improved Algorithm for Computing Logarithm Over GF (p) and its Cryptographic Significance, IEEE Transac Info Theory, vol IT-24, pp 106–110, January 1978.
  • R Rivest, A Shamir & L M Adleman, A method for obtaining Digital Signatures and Public Key Cryptosystem, Comm ACM, vol 21, pp 120–126, February 1976.
  • W Diffle & M E Hellman, Multiuser Cryptographic Technique, Proceedings of AFIPS, pp 109–112, National Comp Conference, 1976.
  • A Shamir, On the Crypto-complexity of Knapsack System, Proc 11th Annual ACM Sympo., Theory of Computing, pp 118–129, 1979.
  • R C Merkle, Secrecy, Authentication, and Public Key Systems, UMI Research Press, Ann Arbor, Michigan, 1979.
  • D E Denning, Cryptography and Data Security, Addison-Wesley Publishing Company, Reading, Mass, 1982.
  • R U Reuppel, Analysis and Design and Stream Ciphers, Springer, Berlin, 1986.
  • D Welsh, Codes and Cryptography, Clarendon Press; Oxford, 1988.
  • J Seberry & J Pieprzyk, Cryptography, An Introduction to Computer Security, Prentice-Hall of Australia, 1989.
  • B Schneier, Applied Cryptography, John Willey and Sons, 1996.
  • A J Menezes, P C van Oorschot & S A Vanstone, Hand book of Applied Cryptography, CRC Press, 1997.
  • S Nandi, Additive Cellular Automata, Theory and Application for Testable Circuit Design and Data Encryption, PhD thesis, IIT Kharagpur, 1994.
  • DK Bhattacharyya & S N N Pandit, Basin Structure with Ultimate Periodicity, in Internet for India Proceedings, pp 95–100, IEEE Computer Society, Hyderabad, 1997.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.