applied cryptography - protocols, algorithms, and source code in c

1286 mo rabin how to exchange secrets by oblivious

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ter Conference, IEEE Press, 1989, pp. 150–154. 1080. C.H. Meyer and S.M. Matyas, Cryptography: A New Dimension in Computer Data Security, New York: John Wiley & Sons, 1982. 1081. C.H. Meyer and M. Schilling, “Secure Program Load with Manipulation Detection Code,” Proceedings of Securicom ’88, 1988, pp. 111–130. 1082. C.H. Meyer and W.L. Tuchman, “Pseudo–Random Codes Can Be Cracked,” Electronic Design, v. 23, Nov 1972. 1083. C.H. Meyer and W.L. Tuchman, “Design Considerations for Cryptography,” Proceedings of the NCC, v. 42, Montvale, NJ: AFIPS Press, Nov 1979, pp. 594–597. 1084. S. Micali, “Fair Public–Key Cryptosystems,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, 1993, pp. 113–138. 1085. S. Micali, “Fair Cryptosystems,” MIT/ LCS/TR–579.b, MIT Laboratory for Computer Science, Nov 1993. 1086. S. Micali, “Fair Cryptosystems and Methods for Use,” U.S. Patent #5,276,737, 4 Jan 1994. 1087. S. Micali, “Fair Cryptosystems and Methods for Use,” U.S. Patent #5,315,658, 24 May 1994. 1088. S. Micali and A. Shamir, “An Improvement on the Fiat–Shamir Identification and Signature Scheme,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 244–247. 1089. M.J. Mihajlevic, “A Correlation Attack on the Binary Sequence Generators with Time–Varying Output Function,” Advances in Cryptology—ASIACRYPT ’94 Proceedings, Springer–Verlag, 1995, pp. 67–79. 1090. M.J. Mihajlevic and J.D. Golic, “A Fast Iterative Algorithm for a Shift Register Internal State Reconstruction Given the Noisy Output Sequence,” Advances in Cryptology—AUSCRYPT ’90 Proceedings, Springer–Verlag, 1990, pp. 165–175. 1091. M.J. Mihajlevic and J.D. Golic, “Convergence of a Bayesian Iterative Error–Correction Procedure to a Noisy Shift Register Sequence,” Advances in Cryptology —EUROCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 124–137. 1092. J.K. Millen, S.C. Clark, and...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online