References

1. ABA Bank Card Standard, “Management and Use of Personal Information Numbers,” Aids from ABA, Catalog no. 207213, American Bankers Association, 1979.

2. ABA Document 4.3, “Key Management Standard,” American Bankers Association, 1980.

3. M. Abadi, J. Feigenbaum, and J. Kilian, “On Hiding Information from an Oracle,” Proceedings of the 19th ACM Symposium on the Theory of Computing, 1987, pp. 195–203.

4. M. Abadi, J. Feigenbaum, and J. Kilian, “On Hiding Information from an Oracle,” Journal of Computer and System Sciences, v. 39, n. 1, Aug 1989, pp. 21–50.

5. M. Abadi and R. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” Research Report 125, Digital Equipment Corp Systems Research Center, Jun 1994.

6. C.M. Adams, “On Immunity Against Biham and Shamir's ‘Differential Cryptanalysis,’” Information Processing Letters, v. 41, 14 Feb 1992, pp. 77–80.

7. C.M. Adams, “Simple and Effective Key Scheduling for Symmetric Ciphers,” Workshop on Selected Areas in Cryptography—Workshop Record, Kingston, Ontario, 5–6 May 1994, pp. 129–133.

8. C.M. Adams and H. Meijer, “Security-Related Comments Regarding McEliece's Public-Key Cryptosystem,” Advances in Cryptology—CRYPTO '87 Proceedings, Springer-Verlag, 1988, pp. 224–230.

9. C.M. Adams and S.E. Tavares, “The Structured Design of Cryptographically Good S-Boxes,” Journal of Cryptology, v. 3, n. 1, 1990, pp. 27–41.

10. C.M. Adams and S.E. Tavares, “Designing S-Boxes for Ciphers Resistant to Differential Cryptanalysis,” ...

Get Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.