applied cryptography - protocols, algorithms, and source code in c

614 meyer schilling 452 micali silvio 94 508 546547

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: sactions on Information Theory, v. 36, n. 3, May 1990, pp. 553–558. 1597. M.J. Wiener, “Efficient DES Key Search,” presented at the rump session of CRYPTO ’93, Aug 1993. 1598. M.J. Wiener, “Efficient DES Key Search,” TR–244, School of Computer Science, Carleton University, May 1994. 1599. M.V. Wilkes, Time–Sharing Computer Systems, New York: American Elsevier, 1968. 1600. E.A. Williams, An Invitation to Cryptograms, New York: Simon and Schuster, 1959. 1601. H.C. Williams, “A Modification of the RSA Public–Key Encryption Procedure,” IEEE Transactions on Information Theory, v. IT–26, n. 6, Nov 1980, pp. 726–729. 1602. H.C. Williams, “An Overview of Factoring,” Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, 1984, pp. 71–80. 1603. H.C. Williams, “Some Public–Key Crypto–Functions as Intractable as Factorization,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 66–70. 1604. H.C. Williams, “Some Public–Key Crypto–Functions as Intractable as Factorization,” Cryptologia, v. 9, n. 3, Jul 1985, pp. 223–237. 1605. H.C. Williams, “An M3 Public–Key Encryption Scheme,” Advances in Cryptology—CRYPTO ’85, Springer–Verlag, 1986, pp. 358–368. 1606. R.S. Winternitz, “Producing One–Way Hash Functions from DES,” Advances in Cryptology: Proceedings of Crypto 83, Plenum Press, 1984, pp. 203–207. 1607. R.S. Winternitz, “A Secure One–Way Hash Function Built from DES,” Proceedings of the 1984 Symposium on Security and Privacy, 1984, pp. 88–90. 1608. S. Wolfram, “Random Sequence Generation by Cellular Automata,” Advances in Applied Mathematics, v. 7, 1986, pp. 123–169. 1609. S. Wolfram, “Cryptography with Cellular Automata,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 429–432. 1610. T.Y.C. Woo and S.S. Lam, “Authentication for Distributed Systems,” Computer, v. 25, n. 1, Jan 1992, pp. 39–52. 1611. T.Y.C. Woo and S.S. Lam, “‘Authentication’ Revisited,” Computer, v. 25, n. 3, Mar 1992, p. 10. 1612. T.Y.C. Woo and S.S. Lam, “A Semantic Model for Authentication Protocols,” Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993, pp. 178–194. 1613. M.C. Wood, technical report, Cryptech, Inc., Jamestown, NY, Jul 1990. 1614. M.C. Wood, “Method of Cryptographically Transforming Electronic Digital Data from One Form to Another,” U.S. Patent #5,...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online