applied cryptography - protocols, algorithms, and source code in c

1404 w schwartau information warfare chaos on the

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: nces in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, 1993, pp. 566–574. 1182. K. Nyberg and L.R. Knudsen, “Provable Security against Differential Cryptanalysis,” Journal of Cryptology, v. 8, n. 1, 1995, pp. 27–37. 1183. K. Nyberg and R.A. Rueppel, “A New Signature Scheme Based on the DSA Giving Message Recovery,” 1st ACM Conference on Computer and Communications Security, ACM Press, 1993, pp. 58–61. 1184. K. Nyberg and R.A. Rueppel, “Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 1185. L. O’Connor, “Enumerating Nondegenerate Permutations,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 368–377. 1186. L. O’Connor, “On the Distribution of Characteristics in Bijective Mappings,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 360–370. 1187. L. O’Connor, “On the Distribution of Characteristics in Composite Permutations,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 403–412. 1188. L. O’Connor and A. Klapper, “Algebraic Nonlinearity and Its Application to Cryptography,” Journal of Cryptology, v. 7, n. 3, 1994, pp. 133–151. 1189. A. Odlyzko, “Discrete Logarithms in Finite Fields and Their Cryptographic Significance,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, pp. 224–314. 1190. A. Odlyzko, “Progress in Integer Factorization and Discrete Logarithms,” unpublished manuscript, Feb 1995. 1191. Office of Technology Assessment, U.S. Congress, “Defending Secrets, Sharing Data: New Locks and Keys for Electronic Communication,” OTA–CIT–310, Washington, D.C.: U.S. Government Printing Office, Oct 1987. 1192. B. O’Higgins, W. Diffie, L. Strawczynski, and R. de Hoog, “Encryption and ISDN—a Natural Fit,” Proceedings of the 1987 International Switching Symposium, 1987, pp. 863–869. 1193. Y. Ohnishi...
View Full Document

Ask a homework question - tutors are online