applied cryptography - protocols, algorithms, and source code in c

136 n 4 jul 1989 pp 262270 1248 d pinkas t parker

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ifornia Institute of Technology, 1978, pp. 114–116. 1042. R.J. McEliece, Finite Fields for Computer Scientists and Engineers, Boston: Kluwer Academic Publishers, 1987. 1043. P. McMahon, “SESAME V2 Public Key and Authorization Extensions to Kerberos,” Proceedings of the Internet Society 1995 Symposium on Network and Distributed Systems Security, IEEE Computer Society Press, 1995, pp. 114–131. 1044. C.A. Meadows, “A System for the Specification and Analysis of Key Management Protocols,” Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp. 182–195. 1045. C.A. Meadows, “Applying Formal Methods to the Analysis of a Key Management Protocol,” Journal of Computer Security, v. 1, n. 1, 1992, pp. 5–35. 1046. C.A. Meadows, “A Model of Computation for the NRL Protocol Analyzer,” Proceedings of the Computer Security Foundations Workshop VII, IEEE Computer Society Press, 1994, pp. 84–89. 1047. C.A. Meadows, “Formal Verification of Cryptographic Protocols: A Survey,” Advances in Cryptology—ASIACRYPT ’94 Proceedings, Springer–Verlag, 1995, pp. 133–150. 1048. G. Medvinsky and B.C. Neuman, “NetCash: A Design for Practical Electronic Currency on the Internet,” Proceedings of the 1st Annual ACM Conference on Computer and Communications Security, ACM Press, 1993, pp. 102–106. 1049. G. Medvinsky and B.C. Neuman, “Electronic Currency for the Internet,” Electronic Markets, v. 3, n. 9/10, Oct 1993, pp. 23–24. 1050. W. Meier, “On the Security of the IDEA Block Cipher,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 371–385. 1051. W. Meier and O. Staffelbach, “Fast Correlation Attacks on Stream Ciphers,” Journal of Cryptology, v. 1, n. 3, 1989, pp. 159–176. 1052. W. Meier and O. Staffelbach, “Analysis of Pseudo Random Sequences Generated by Cellular Automata,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 186–199. 1053. W. Meier and O. Staffelbach, “Correlati...
View Full Document

Ask a homework question - tutors are online