{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

applied cryptography - protocols, algorithms, and source code in c

119131 1560 j van tilburg cryptanalysis of the xinmei

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Communications of the ACM, v. 27, n. 4, Apr 1984, pp. 393–395. 1328. R.L. Rivest, A. Shamir, and L.M. Adleman, “A Method for Obtaining Digital Signatures and Public–Key Cryptosystems,” Communications of the ACM, v. 21, n. 2, Feb 1978, pp. 120–126. 1329. R.L. Rivest, A. Shamir, and L.M. Adleman, “On Digital Signatures and Public Key Cryptosystems,” MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR–212, Jan 1979. 1330. R.L. Rivest, A. Shamir, and L.M. Adleman, “Cryptographic Communications System and Method,” U.S. Patent #4,405,829, 20 Sep 1983. 1331. M.J.B. Robshaw, “Implementations of the Search for Pseudo–Collisions in MD5,” Technical Report TR–103, Version 2.0, RSA Laboratories, Nov 1993. 1332. M.J.B. Robshaw, “The Final Report of RACE 1040: A Technical Summary,” Technical Report TR–9001, Version 1.0, RSA Laboratories, Jul 1993. 1333. M.J.B. Robshaw, “On Evaluating the Linear Complexity of a Sequence of Least Period 2n,” Designs, Codes and Cryptography, v. 4, n. 3, 1994, pp. 263–269. 1334. M.J.B. Robshaw, “Block Ciphers,” Technical Report TR–601, RSA Laboratories, Jul 1994. 1335. M.J.B. Robshaw, “MD2, MD4, MD5, SHA, and Other Hash Functions,” Technical Report TR–101, Version 3.0, RSA Laboratories, Jul 1994. 1336. M.J.B. Robshaw, “On Pseudo–Collisions in MD5,” Technical Report TR–102, Version 1.1, RSA Laboratories, Jul 1994. 1337. M.J.B. Robshaw, “Security of RC4,” Technical Report TR–401, RSA Laboratories, Jul 1994. 1338. M.J.B. Robshaw, personal communication, 1995. 1339. M. Roe, “Reverse Engineering of an EES Device,” K.U. Leuven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 1340. P. Rogaway and D. Coppersmith, “A Software–Oriented Encryption Algorithm,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 56–63. 1341. H.L. Rogers, “An Overview of the Candware Program,” Proceedings of the 3rd Annual Symposium on Physical/Electronic Security, Armed F...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online