BREAKING BLOCK AND PRODUCT CIPHERS
E. Fogal, and Y. F. Huang, On the value of information in system identification - bounded noise case, Automatica, (18) 2 (1982), pp. 229-238.
A. Carlson, R. B. Wells, and R. E. Hiromoto, Using set theoretic estimation to implement Shannon secrecy theory, The Proceedings of the Third IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications IDAACS’2005, Sofia, Bulgaria, September 5-7, 2005, pp. 435-438.
C. E. Shannon, Communication theory of secrecy systems, Bell Systems Technical Journal, (28) (1949), pp. 656-715.
B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd ed., John Wiley and Sons Inc., New York, NY, 1996.
R. B. Wells, Applied Coding and Information Theory, 1st ed., Prentice Hall, Upper Saddle River, NJ, 1999.
S. Ross, A First Course in Probability, 1st ed., MacMillan Publishing, Inc., New York, NY, 1976.
P. Garrett, The Mathematics of Coding Theory, 1st ed.. Pearson/Prentice Hall, Upper Saddle River, NJ, 2004.
T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed., Wiley-Interscience, Hoboken, NJ, 2001.
D. R. Stinson, Cryptography: Theory and Practice, 3rd ed., Chapman Hall/CRC Press, London, England, 2006.
P. L. Combettes, The foundations of set theoretic estimation, Proceedings of the IEEE, (81) 2 (1993), pp. 182-208.
The Gutenberg Project, Internet, http://www.gutenberg.net
Fred Schweppe, Recursive state estimation: Unknown but bounded errors and system inputs, IEEE Transactions on Automatic Control, (13) 1 (1968), pp. 22-28.
Albert Carlson, Set Theoretic Estimation Applied to the Information Content of Ciphers and Decryption, PhD Thesis, University of Idaho, 2012.
Horst Feistel, Cryptography and computer privacy, Scientific American, (228) 5 (1973), pp. 15-20.
- There are currently no refbacks.