Active Bibliography

3 Secure Communication: a New Application for Active Networks – Manuel Günter, Marc Brogle, Torsten Braun - 2000
REFERENCES – unknown authors
Streaming Source Coding with Delay by – Cheng Chang, Cheng Chang, Cheng Chang
1 A Large-Deviations Notion of Perfect Secrecy – Neri Merhav - 2002
8 Symmetric and asymmetric encryption – Gustavus J. Simmons - 1979
1 Bounds on Key Appearance Equivocation for Substitution Ciphers – Yuri Borissov, Moon Ho Lee, Senior Member - 2007
1 Cryptology – Prof Ronald Rivest, L. Rivest
47 An Overview of Multimedia Content Protection in consumer electronics devices – Ahmet M. Eskicioglu, Edward J. Delp - 2001
9 The Shannon Cipher System with a Guessing Wiretapper – Neri Merhav, Erdal Arikan - 1998
47 On the Security of Multiple Encryption – Ralph C. Merkle, Martin E. Hellman - 1981
13 On secret sharing communication systems with two or three channels – Hirosuke Yamamoto - 1986
19 Rate distortion theory for the shannon cipher system – Hirosuke Yamamoto - 1997
1 Coding Theorems for a (2, 2)–Threshold Scheme with Detectability of Impersonation Attacks – Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto
1 Perfectly Secure Encryption of Individual Sequences ∗ – Neri Merhav
Cryptographic Primitives – Paul Garrett - 2007
1 Cryptanalysis of LFSR-based pseudorandom generators - a survey – Erik Zenner, Erik Zenner, Theoretische Informatik - 2004
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES)I – Burton S. Kaliski, Ronald L. Rivest, Alan T. Sherman
16 Empirical Evidence concerning AES – Peter Hellekalek, Stefan Wegenkittl - 2003
Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction Sohit Kumar – Scholar (master Of Technology, Ashish Vashistha