[1] Rueppel R A. Analysis and design of stream ciphers. New York:Springer-Verlag, 1986.
[2] Meier W, Staffelbach O. Correlation properties of combiners with memory in stream ciphers //Proceedings of Advances in Cryptology: EuroCrypt '90, 1990, LNCS 473. Berlin:Springer-Verlag,1990:204-213.
[3] 张玉安. 对称钥加密算法设计与分析. 北京: 中国科学院研究生院, 2004. Zhang Yu'an. The design and cryptanalysis of symmetric key encryption . Beijing: Graduate School of Chinese Academy of Sciences, 2004.
[4] 张雅,冯登国. 换位密码及其前景展望
[J]. 北京邮电大学学报, 2003, 26(增刊): 134-136. Zhang Ya, Feng Dengguo. Transposition cryptosystem and the future expectation . Journal of Beijing University of Posts and Telecommunications, 2003, 26(Sup): 134-136.
[5] Zhang Ya, Feng Dengguo. AA5: another analogue cipher of A5 //Proceedings of 2003 International Workshop on Cryptology and Network Security (CNS '03). Florida: Knowledge Systems Institude, 2003: 624-628.
[6] 张玉安,冯登国. 一种实用的仿一次一密分组加密方案
[J]. 北京邮电大学学报, 2005, 28(2): 101-104. Zhang Yu'an, Feng Dengguo. A practical one-time-pad-like block cipher scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(2): 101-104.
|