This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   

[1] O. Jung and C. Ruland, “Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks,” Proc. Cryptographic Hardware and Embedded Systems (CHES '99), pp. 340-352, 1999.
[2] A.J. Menezes, P. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997.
[3] Nat'l Inst, of Standards and Tech nology, “Data Encryption Standard (DES),” Federal Information Processing Standard 46, 1977.
[4] Nat'l Inst. Standards and Tech nology, “Advanced Encryption Standard (AES),” Federal Information Processing Standard 197, 2001.
[5] Int'l Organization for Standardization (ISO), “Information TechnologySecurity TechniquesModes of Operation for an n-bit Block Cipher,” ISO/IEC 10116, 1997.
[6] U.M. Maurer, “New Approaches to the Design of Self-Synchronizing Stream Ciphers,” Advances in CryptologyProc. EUROCRYPT '91, pp. 458-471, 1991.
[7] A. Alkassar, A. Geraldy, B. Pfitzmann, and A.-R. Sadeghi, “Optimized Self-Synchronizing Mode of Operation,” Fast Software Encryption Workshop (FSE 2001), Apr. 2001.
[8] D.R. Stinson, Cryptography: Theory and Practice, second ed. CRC Press, 2002.
[9] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, “A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation,” Proc. 38th Ann. Symp. Foundations of Computer Science, pp. 394-403, 1997.

Citation:
Jean-Luc Gaudiot, "Introducing the New Editor-in-Chief of the IEEE Transactions on Computers," IEEE Transactions on Computers, vol. 52, no. 1, pp. 1-2, Jan. 2003, doi:10.1109/TC.2003.10000
Usage of this product signifies your acceptance of the Terms of Use.