참고문헌
- A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
- H. Feistel, 'Cryptography and Computer Privacy,' Scientific American, vol. 228, pp. 15-23, 1973
- H. Feistel, W. A. Nots, 'Some Cryptographic Techniques for Machine-to-Machine Data Communication,' Proc. of the IEEE, vol. 63, pp 1545-1554, 1975
- National Institute of Standard and Technology, 'Anouncing Request for Candidate Algorithm Nominations for The Advanced Encryption Standard (AES),' Federal Register, vol. 62, pp. 48051-48058, 1997
- National Bureau of Standard NBS FIPS PUB 46, 'Data Encryption Standard,' National Bureau of Standards, U.S. Depardment of Commerce, 1997
- National Bureau of Standard NBS FIPS PUB 81, 'DES Mode of Operation,' National Bureau of Standard, U.S. Depardment of Commerce, 1980
- M. Naor, O. Reingold, 'On the construction of Pseudorandom Permutations : Luby-Rackoff Revisited,' J. Cryptology, vol. 12, pp. 29-66, 1999 https://doi.org/10.1007/PL00003817
- B. Schneier, J. Kelsey, 'Unbalanced Feistel Networks and Block-Cipher Design,' Proc. Fast Software Encryption, Lecture Notes in computer Science, vol. 1039, Springer-Verlag, Berlin, pp. 121-144, 1996 https://doi.org/10.1007/3-540-60865-6_49
- O. Goldreich, Foundations of Cryptography(Fragments of book), available on line : http://theory.lcs.mit.edu/~oded/, 1998
- M. Luby, C. Rackoff, 'How to construct pseudorandom permutations form pseudorandom functions,' SIAM J. Comput., vol. 17, pp. 373--386, 1988 https://doi.org/10.1137/0217022
- C.S. Jutla, 'Generalized Birthday Attacks on Unbalanced Feistel Networks,' Advances in Cryptology-CRYPTO '98, Lecture Notes in Computer, vol. 1462, Springer-Verlag, Berlin, pp. 186-199, 1998 https://doi.org/10.1007/BFb0055715
- J. Patarin, 'How to Construct pseudorandom and super pseudorandom permutation from one single pseudorandom function,' Advances in Cryptology-EUROCRYPTO '92, Lecture Notes in Computer Science, vol. 658, Springer-Verlag, Berlin, pp. 256-266, 1992
- J. Pieprzyk, 'How to construct pseudorandom permutations form single pseudorandom functions,' Advances in Cryptology - EUROCRYPT'90, Lecture Notes in Computer Science, vol. 473, Springer-Verlag, Berlin, pp. 140-150, 1991
- B. Sadeghiyan, J. Pieprzyk, 'A construction for super pseudorandom permutations form a single pseudorandom permutations form a single pseudorandom function,' Advances in Cryptology - EUROCRYPT '92, Lecture Notes in computer Science, vol. 658, Springer-Verlag, Berlin, pp. 267-284, 1992
- Y. Zheng, T. Matsumoto, and H. Imai, 'Impossibility and optimality results on constructing pseudorandom permutations,' Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, Springer-Verlag, Berlin, pp. 412-422, 1990
- A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997