Susarla, Lakshmi Bhavani Madhuri; Kumar, S. Udaya A block cipher using an iterative method involving a permutation. (English) Zbl 1495.94038 J. Discrete Math. Sci. Cryptography 18, No. 3, 275-292 (2015). MSC: 94A55 Shift register sequences and sequences over finite alphabets in information and communication theory 05A05 Permutations, words, matrices Keywords:block cipher × Cite Format Result Cite Review PDF Full Text: DOI References: [1] William, Stallings, Cryptography and Network Security: Principles and Practices, 37 [2] Feistel, H., Cryptography and Computer Privacy, Scientific American, 228, 5, 15-23 (1973) [3] Feistel, H.; Notz, W.; Smith, J., Some Cryptographic Techniques for Machine-to-Machine Data Communications, Proceedings of the IEEE, 63, 11, 1545-1554 (1975) [4] Sastry, V. U. K.; Janaki, V., On the Modular Arithmetic Inverse in the Cryptology of Hill Cipher This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.