This preview shows page 1. Sign up to view the full content.
Unformatted text preview: . 1438. A. Shimizu and S. Miyaguchi, “Data Randomization Equipment,” U.S. Patent #4,850,019, 18 Jul 1989. 1439. M. Shimada, “Another Practical Public–key Cryptosystem,” Electronics Letters, v. 28, n. 23, 5 Nov 1992, pp. 2146–2147. 1440. K. Shirriff, personal communication, 1993. 1441. H. Shizuya, T. Itoh, and K. Sakurai, “On the Complexity of Hyperelliptic Discrete Logarithm Problem,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 337–351. 1442. Z. Shmuley, “Composite Diffie–Hellman Public–Key Generating Systems Are Hard to Break,” Computer Science Department, Technion, Haifa, Israel, Technical Report 356, Feb 1985. 1443. P.W. Shor, “Algorithms for Quantum Computation: Discrete Log and Factoring,” Proceedings of the 35th Symposium on Foundations of Computer Science, 1994, pp. 124–134. 1444. L. Shroyer, letter to NIST regarding DSS, 17 Feb 1992. 1445. C. Shu, T. Matsumoto, and H. Imai, “A Multi–Purpose Proof System, Transactions of the Institute of Electronics, Information, and Communication Engineers, v. E75–A, n. 6, Jun 1992, pp. 735–743. 1446. E.H. Sibley, “Random Number Generators: Good Ones Are Hard to Find,” Communications of the ACM, v. 31, n. 10, Oct 1988, pp. 1192–1201. 1447. V.M. Sidenikov and S.O. Shestakov, “On Encryption Based on Generalized Reed–Solomon Codes,” Diskretnaya Math, v. 4, 1992, pp. 57–63. (In Russian.) 1448. V.M. Sidenikov and S.O. Shestakov, “On Insecurity of Cryptosystems Based on Generalized Reed–Solomon Codes,” unpublished manuscript, 1992. 1449. D.P. Sidhu, “Authentication Protocols for Computer Networks,” Computer Networks and ISDN Systems, v. 11, n. 4, Apr 1986, pp. 297–310. 1450. T. Siegenthaler, “Correlation–Immunity of Nonlinear Combining Functions for Cryptographic Applications,” IEEE Transactions on Information Theory, v. IT–30, n. 5, Sep 1984, pp. 776–780. 1451. T. Siegenthaler, “Decrypting a Class of Stream Ciphers Using Ciphertext Only,” IEEE Transactions on Computing, v. C–34, Jan 1985, pp. 81–85. 1452. T. Siegenthaler, “Cryptanalyst’s Representation of Nonlinearity Filtered ml–sequences,” Advances in Cryptology—EUROCRYPT ’85, Springer–Verlag, 1986, pp. 103–110. 1453. R.D. Silverman, “The Multiple Polynomial Quadratic Sieve,” Mathematics of Computation, v. 48, n. 177, Jan 1987, pp. 329–339. 1454. G.J. Simmons, “Authentication without Secrecy: A Secure Communication Problem...
View
Full
Document
This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.
 Fall '10
 ALIULGER
 Cryptography

Click to edit the document details