[1] J L Massey.SAFERK-64:A Byte-oriented Block-ciphering Algorithm. Fast Software Encryption.Proc Cambridge Security Work shop,Camb ridge, U K, LNCS 809.S pringer Verlag, 1994.1 ~ 17[2] J L Massey, G H Khachat rian, M K Kuregian.Nomination of SAFER+ as Candidate Algorithm for the Advanced Encryption St andard(AES).http ://w w w.ni st.gov/aes[3] J L Massey, G H Khachatrian, M K Kuregian.Nomination of SAFER++ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption (NESS IE).http://[4] J L Massey.SAFERK-64 :One Year Later.Fast Software Encryption II, LNCS 1008.New York :Springer, 1995[5] J L Massey.On the optimali ty of SAFER+Diffusion.http://www.nist.gov/a es[6] L R Knudsen.A Key-S chedule Weakness in SAFER K-64.Advances in Cryptography-C RYPTO'95, LNCS 962, S pringer 1995[7] J Kelsey, B Schneier, D Wagner.Key Schedule Weaknesses in SAFE R++.http ://ww w.nist.gov/aes[8] Charles S Williams.Proposal for a "Tweak"to Cylink's AES Candidate Algorithm SAFER+.ht tp ://www.nist.gov/aes[9] J Daemen.Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis.K U Leuven.Doctoral Dissertation.1995 |