applied cryptography - protocols, algorithms, and source code in c

1172 r nbauer cryptanalysis of the rdei scheme

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: yptology—AUSCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 539–542. 969. R. Lidl, W.B. Müller, and A. Oswald, “Some Remarks on Strong Fibonacci Pseudoprimes,” Applicable Algebra in Engineering, Communication and Computing, v. 1, n. 1, 1990, pp. 59–65. 970. R. Lidl and H. Niederreiter, “Finite Fields,” Encyclopedia of Mathematics and its Applications, v. 20, Addison–Wesley, 1983. 971. R. Lidl and H. Niederreiter, Introduction to Finite Fields and Their Applications, London: Cambridge University Press, 1986. 972. K. Lieberherr, “Uniform Complexity and Digital Signatures,” Theoretical Computer Science, v. 16, n. 1, Oct 1981, pp. 99–110. 973. C.H. Lim and P.J. Lee, “A Practical Electronic Cash System for Smart Cards,” Proceedings of the 1993 Korea–Japan Workshop on Information Security and Cryptography, Seoul, Korea, 24–26 Oct 1993, pp. 34–47. 974. C.H. Lim and P.J. Lee, “Security of Interactive DSA Batch Verification,” Electronics Letters, v. 30, n. 19, 15 Sep 1994, pp. 1592–1593. 975. H.–Y. Lin and L. Harn, “A Generalized Secret Sharing Scheme with Cheater Detection,” Advances in Cryptology—ASIACRYPT ’91 Proceedings, Springer–Verlag, 1993, pp. 149–158. 976. M.–C. Lin, T.–C. Chang, and H.–L. Fu, “Information Rate of McEliece’s Public–key Cryptosystem,” Electronics Letters, v. 26, n. 1, 4 Jan 1990, pp. 16–18. 977. J. Linn, “Privacy Enhancement for Internet Electronic Mail: Part I—Message Encipherment and Authentication Procedures,” RFC 989, Feb 1987. 978. J. Linn, “Privacy Enhancement for Internet Electronic Mail: Part I—Message Encipherment and Authentication Procedures,” RFC 1040, Jan 1988. 979. J. Linn, “Privacy Enhancement for Internet Electronic Mail: Part I—Message Encipherment and Authentication Procedures,” RFC 1113, Aug 1989. 980. J. Linn, “Privacy Enhancement for Internet Electronic Mail: Part III—Algorithms, Modes, and Identifiers,” RFC 1115, Aug 1989. 981. J. Linn, “Privacy Enhancement for Internet Electronic Mail: Part I—Message Encipherment and Auth...
View Full Document

Ask a homework question - tutors are online