[1] | Shyam Nandan Kumar, “Technique for Security of Multimedia using Neural Network,” Paper id-IJRETM-2014-02-05-020, IJRETM, Vol: 02, Issue: 05, pp.1-7. Sep-2014 |
|
[2] | Simmonds, A; Sandilands, P; van Ekert, L (2004). “An Ontology for Network Security Attacks”. Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317-323. |
|
[3] | Bellare, Mihir; Rogaway, Phillip (21 September 2005). “Introduction”. Introduction to Modern Cryptography. p. 10. |
|
[4] | Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. “A. Handbook of Applied Cryptography”. ISBN 0-8493-8523-7. |
|
[5] | Davis, R., “The Data Encryption Standard in Perspective,” Proceeding of Communication Society magazine, IEEE, Volume 16 No 6, pp. 5-6, Nov. 1978. |
|
[6] | S. NIST Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, May 2004. |
|
[7] | Daemen, J., and Rijmen, V. “Rijndael: AES-The Advanced Encryption Standard, Springer, Heidelberg, March 2001. |
|
[8] | FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 26, 2001. |
|
[9] | Bruce Schneier (1993). “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”. Fast Software Encryption, Cambridge Security Workshop Proceedings (Springer-Verlag): 191-204. |
|
[10] | Schneier, Bruce (2005-11-23). “Twofish Cryptanalysis Rumors”. Schneier on Security blog. Retrieved 2013-01-14. |
|
[11] | Matsui, Mitsuru; Tokita, Toshio (Dec 2000). “MISTY, KASUMI and Camellia Cipher Algorithm Development”. Mitsibishi Electric Advance (Mitsibishi Electric corp.) 100: 2-8. ISSN 1345-3041. |
|
[12] | General Report on the Design, Speification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms”. 3GPP. 2009 |
|
[13] | O. Dunkelman, N. Keller, A. Shamir, \A practical-time attack on the KASUMI cryptosystem used in GSM and 3G telephony,” Advances in Cryptology, Proceedings Crypto'10, LNCS, T. Rabin, Ed., Springer, Heidelberg, 2010 |
|
[14] | R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication of the ACM, Volume 21 No. 2, Feb. 1978. |
|
[15] | Diffie, W.; Hellman, M. (1976). “New directions in cryptography”. IEEE Transactions on Information Theory 22 (6): 644-654. |
|
[16] | Koblitz, N., 1987. “Elliptic curve cryptosystems. Mathematics of Computation” 48, 203-209. |
|
[17] | Miller, V., 1985. “Use of elliptic curves in cryptography”. CRYPTO 85. |
|
[18] | FIPS 180, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180, NIST, U.S. Dept. of Commerce, May 11, 1993. |
|
[19] | M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, M. Schla er, \Rebound distinguishers: results on the full Whirlpool compression function,” Advances in Cryptology, Proceedings Asiacrypt'09, LNCS 5912, M. Matsui, Ed., Springer, Heidelberg, 2009, pp. 126-143. |
|
[20] | Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). “Keying Hash Functions for Message Authentication”. |
|
[21] | NIST Special Publication 800-38B, “Recommendation for Block Cipher Modes of Operation”: The CMAC Mode for Authentication, May 2005. |
|