applied cryptography - protocols, algorithms, and source code in c

1222 ga orton mp roy pa scott le peppard and se

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ngs of the 1994 Symposium on Cryptography and Information Security (SCIS 94), Lake Biwa, Japan, 27–29 Jan 1994, pp. 4A.1–11. (In Japanese.) 1018. M. Matsui, “On Correlation Between the Order of the S–Boxes and the Strength of DES,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 1019. M. Matsui, “The First Experimental Cryptanalysis of the Data Encryption Standard,” Advances in Cryptology—CRYPTO ’94 Proceedings, Springer–Verlag, 1994, pp. 1–11. 1020. M. Matsui and A. Yamagishi, “A New Method for Known Plaintext Attack of FEAL Cipher,” Advances in Cryptology—EUROCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 81–91. 1021. T. Matsumoto and H. Imai, “A Class of Asymmetric Crypto–Systems Based on Polynomials Over Finite Rings,” IEEE International Symposium on Information Theory, 1983, pp. 131–132. 1022. T. Matsumoto and H. Imai, “On the Key Production System: A Practical Solution to the Key Distribution Problem,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 185–193. 1023. T. Matsumoto and H. Imai, “On the Security of Some Key Sharing Schemes (Part 2),” IEICE Japan, Technical Report, ISEC90–28, 1990. 1024. S.M. Matyas, “Digital Signatures—An Overview,” Computer Networks, v. 3, n. 2, Apr 1979, pp. 87–94. 1025. S.M. Matyas, “Key Handling with Control Vectors,” IBM Systems Journal, v. 30, n. 2, 1991, pp. 151–174. 1026. S.M. Matyas, A.V. Le, and D.G. Abraham, “A Key Management Scheme Based on Control Vectors,” IBM Systems Journal, v. 30, n. 2, 1991, pp. 175–191. 1027. S.M. Matyas and C.H. Meyer, “Generation, Distribution, and Installation of Cryptographic Keys,” IBM Systems Journal, v. 17, n. 2, 1978, pp. 126–137. 1028. S.M. Matyas, C.H. Meyer, and J. Oseas, “Generating Strong One–Way Functions with Cryptographic Algorithm,” IBM Technical Disclosure Bulletin, v. 27, n. 10A, Mar 1985, pp. 5658–5659. 1029. U.M. Maurer,...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online