![]() | ![]() |
1983 | ||
---|---|---|
3 | Robert R. Jueneman, Stephen M. Matyas, Carl H. Meyer: Message Authentication with Manipulation Detection Code. IEEE Symposium on Security and Privacy 1983: 33-54 | |
1978 | ||
2 | William R. Ehrsam, Stephen M. Matyas, Carl H. Meyer, Walter L. Tuchman: A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard. IBM Systems Journal 17(2): 106-125 (1978) | |
1 | Stephen M. Matyas, Carl H. Meyer: Generation, Distribution, and Installation of Cryptographic Keys. IBM Systems Journal 17(2): 126-137 (1978) |
1 | William R. Ehrsam | [2] |
2 | Robert R. Jueneman | [3] |
3 | Stephen M. Matyas | [1] [2] [3] |
4 | Walter L. Tuchman | [2] |