References
1. Kahn, D., The Codebreakers, Macmillan Publishing Company, New York, 1967.
2. Diffie, W., and Hellman, M.E., “Privacy and Authentication: An Introduction to Cryptography,” Proc. IEEE, vol. 67, no. 3, Mar. 1979, pp. 397–427.
3. Beker,H., and Piper, F., Cipher Systems, John Wiley & Sons, Inc., New York, 1982.
4. Denning, D.E.R., Cryptography and Data Security, Addison-Wesley Publishing Company, Reading, Mass., 1982.
5. Shannon, C.E., “Communication Theory of Secrecy Systems,” Bell Syst. Tech. J., vol. 28, Oct. 1949, pp. 656–715.
6. Hellman, M. E., “An Extension of the Shannon Theory Approach to Cryptography,” IEEE Trans. Inf. Theory, vol. IT23, May 1978, pp. 289–294.
7. Smith, J. L., “The Design of Lucifer, a Cryptographic Device for Data Communications,” IBM Research Rep. RC-3326, 1971.
8. Feistel, H. “Cryptography and Computer Privacy,” Sci. Am., vol. 228, no. 5, May 1973, pp. 15–23.
9. National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standard (FIPS), Publication no. 46, Jan. 1977.
10. United States Senate Select Committee on Intelligence, “Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard,” IEEE Commun. Soc. Mag., vol. 16, no. 6, Nov. 1978, pp. 53–55.
11. Stallings, W., Cryptography and Network Security, Second Edition, Prentice Hall, Upper Saddle River, NJ. 1998.
12. Diffie, W., and Hellman, M. E., “New Directions in Cryptography,” IEEE Trans. Inf. Theory, vol. IT22, Nov. 1976, pp. 644–654.
13. Rivest, R.L., Shamir, A., and Adelman, L., “On Digital Signatures and Public Key Cryptosystems,” Commun. ACM, vol. 21, Feb. 1978, pp. 120–126.
14. Knuth, D. E., The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, 2nd ed., Addison-Wesley Publishing Company, Reading, Mass., 1981.
15. Merkel, R. C., and Hellman, M. E., “Hiding Information and Signatures in Trap-Door Knapsacks,” IEEE Trans. Inf. Theory, vol. IT24, Sept. 1978, pp. 525–530.
16. Shamir, A., “A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem,” IEEE 23rd Ann. Symp. Found. Comput. Sci., 1982, pp. 145–153.
17. Zimmerman, P. The Official PGP User’s Guide, MIT Press, Cambridge, 1995.
18. PGP Freeware User’s Guide, Version 6.5, Network Associates, Inc., 1999.
19. Schneier, B., Applied Cryptography, John Wiley & Sons, New York, 1996.
20. Hellman, M. E., Martin, Bailey, Diffie, W., and Merkle, R. C., United States Patent 4,200,700: Cryptographic Apparatus and Method, United States Patent and Trademark Office, Washington, DC, 1980.
21. Stinson, Douglas, Cryptography Theory and Practice. CRC Press, Boca Raton, FL, 1995.
22. Digital Signature Standard (Federal Information Processing Standards Publication 186–1), Government Printing Office, Springfield, VA, Dec. 15, 1998.