[1] Menezes A J, van Oorschot P, Vanstone S. Handbook of applied cryptography [M]. London:CRC Press, 1997.
[2] National Bureau of Standards 1980, DES Modes of Operation [S].
[3] Diffie W, Hellman M, Privacy, et al. An introduction to cryptography //Proceedings of the IEEE, 1979, 67(3): 397-427.
[4] Rogaway P. OCB mode: parallelizable authenticated encryption . ACM Transactions on Information and System Security, 2003, 6(3): 365-403.
[5] Gligor V, Donescu P. Fast encryption and authentication //XCBC Encryption and XECB Authentication Modes, FSE 2001, LNCS. Springer-Verlag, 2001: 92-108.
[6] Jutla C. Encryption modes with almost free message integrity //Advances in Cryptology-Eurocrypt01, LNCS. Berlin: Springer-Verlag, 2001,2045: 529-544.
[7] Bellare M, Rogaway P, Wagner D. The EAX mode of operation //FSE 2004, LNCS. Spriger-Verlag, 2004: 389-407.
[8] Serge Vaudenay. A theory for block cipher security [J]. Journal of Cryptology, 2003, 16: 249-286.
[9] 周美珂. 泛函分析 [M]. 北京:北京师范大学出版社, 2007: 103-116.
|