applied cryptography - protocols, algorithms, and source code in c

127 131 606 pr geffe how to protect data with ciphers

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: g, 1991, pp. 352–367. 445. C.A. Deavours, “Unicity Points in Cryptanalysis,” Cryptologia, v. 1, n. 1, 1977, pp. 46–68. 446. C.A. Deavours, “The Black Chamber: A Column; How the British Broke Enigma,” Cryptologia, v. 4, n. 3, Jul 1980, pp. 129– 132. 447. C.A. Deavours, “The Black Chamber: A Column; La Méthode des Bâtons,” Cryptologia, v. 4, n. 4, Oct 1980, pp. 240–247. 448. C.A. Deavours and L. Kruh, Machine Cryptography and Modern Cryptanalysis, Norwood MA: Artech House, 1985. 449. J.M. DeLaurentis, “A Further Weakness in the Common Modulus Protocol for the RSA Cryptosystem,” Cryptologia, v. 8, n. 3, Jul 1984, pp. 253–259. 450. P. Delsarte, Y. Desmedt, A. Odlyzko, and P. Piret, “Fast Cryptanalysis of the Matsumoto–Imai Public–Key Scheme,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, pp. 142–149. 451. P. Delsarte and P. Piret, “Comment on ‘Extension of RSA Cryptostructure: A Galois Approach’,” Electronics Letters, v. 18, n. 13, 24 Jun 1982, pp. 582–583. 452. R. DeMillo, N. Lynch, and M. Merritt, “Cryptographic Protocols,” Proceedings of the 14th Annual Symposium on the Theory of Computing, 1982, pp. 383–400. 453. R. DeMillo and M. Merritt, “Protocols for Data Security,” Computer, v. 16, n. 2, Feb 1983, pp. 39–50. 454. N. Demytko, “A New Elliptic Curve Based Analogue of RSA,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 40–49. 455. D.E. Denning, “Secure Personal Computing in an Insecure Network,” Communications of the ACM, v. 22, n. 8, Aug 1979, pp. 476–482. 456. D.E. Denning, Cryptography and Data Security, Addison–Wesley, 1982. 457. D.E. Denning, “Protecting Public Keys and Signature Keys,” Computer, v. 16, n. 2, Feb 1983, pp. 27–35. 458. D.E. Denning, “Digital Signatures with RSA and Other Public–Key Cryptosystems,” Communications of the ACM, v. 27, n. 4, Apr 1984, pp. 388–392. 459. D.E. Denning, “The Data Encrypti...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online