Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/asiacrypt/ReznyT92
%A Rezny, Mike
%A Trimarchi, Eddie
%B AUSCRYPT
%D 1992
%E Seberry, Jennifer
%E Zheng, Yuliang
%I Springer
%K dblp
%P 531-534
%T A Block Cipher Method using Combinations of Different Methods under the Control of the User Key.
%U http://dblp.uni-trier.de/db/conf/asiacrypt/asiacrypt92.html#ReznyT92
%V 718
%@ 3-540-57220-1
@inproceedings{conf/asiacrypt/ReznyT92,
added-at = {2017-05-19T00:00:00.000+0200},
author = {Rezny, Mike and Trimarchi, Eddie},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/2006f5afb57085b86f0010b38b44ea670/dblp},
booktitle = {AUSCRYPT},
crossref = {conf/asiacrypt/1992},
editor = {Seberry, Jennifer and Zheng, Yuliang},
ee = {https://doi.org/10.1007/3-540-57220-1_90},
interhash = {e671c54b1b0aed21931a0101d8ca8bb6},
intrahash = {006f5afb57085b86f0010b38b44ea670},
isbn = {3-540-57220-1},
keywords = {dblp},
pages = {531-534},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-09-27T15:20:49.000+0200},
title = {A Block Cipher Method using Combinations of Different Methods under the Control of the User Key.},
url = {http://dblp.uni-trier.de/db/conf/asiacrypt/asiacrypt92.html#ReznyT92},
volume = 718,
year = 1992
}