REFERENCES
- A Sinkov, Elementary Cryptanalysis, Math Assoc, 1966.
- G E Mellen, Cryptography, Computers and Common Sense, NCC, vol 42, pp 569–579, 1973.
- E Sam, Musical Cryptography, Cryptologia, vol 3, pp 193–201, October 1979.
- P P Choudhuri, D R Choudhuri, S Nandi & S Chattopadhyay, Additive Cellular Automata: Theory and Application, vol I, IEEE CS, 1997.
- D Kahn, The Codebreaker, Macmillan Co, Newyork, 1967.
- C E Shannon, Comm Theory of Secrecy Systems, Tech Rep 28, Bell Syst Tech J, 1949.
- H Feistel, Cryptography and Computer Privacy, Sci Am, vol 228, pp 15–23. May 1973.
- F P 46, Data Encryption Standard, January 1967.
- S Pohling & M Hellman, An Improved Algorithm for Computing Logarithm Over GF (p) and its Cryptographic Significance, IEEE Transac Info Theory, vol IT-24, pp 106–110, January 1978.
- R Rivest, A Shamir & L M Adleman, A method for obtaining Digital Signatures and Public Key Cryptosystem, Comm ACM, vol 21, pp 120–126, February 1976.
- W Diffle & M E Hellman, Multiuser Cryptographic Technique, Proceedings of AFIPS, pp 109–112, National Comp Conference, 1976.
- A Shamir, On the Crypto-complexity of Knapsack System, Proc 11th Annual ACM Sympo., Theory of Computing, pp 118–129, 1979.
- R C Merkle, Secrecy, Authentication, and Public Key Systems, UMI Research Press, Ann Arbor, Michigan, 1979.
- D E Denning, Cryptography and Data Security, Addison-Wesley Publishing Company, Reading, Mass, 1982.
- R U Reuppel, Analysis and Design and Stream Ciphers, Springer, Berlin, 1986.
- D Welsh, Codes and Cryptography, Clarendon Press; Oxford, 1988.
- J Seberry & J Pieprzyk, Cryptography, An Introduction to Computer Security, Prentice-Hall of Australia, 1989.
- B Schneier, Applied Cryptography, John Willey and Sons, 1996.
- A J Menezes, P C van Oorschot & S A Vanstone, Hand book of Applied Cryptography, CRC Press, 1997.
- S Nandi, Additive Cellular Automata, Theory and Application for Testable Circuit Design and Data Encryption, PhD thesis, IIT Kharagpur, 1994.
- DK Bhattacharyya & S N N Pandit, Basin Structure with Ultimate Periodicity, in Internet for India Proceedings, pp 95–100, IEEE Computer Society, Hyderabad, 1997.