applied cryptography - protocols, algorithms, and source code in c

148155 730 e heyst and tp pederson how to make

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: y University of New York Graduate School and University Center, Feb 1995. 569. R. Flynn and A.S. Campasano, “Data Dependent Keys for Selective Encryption Terminal,” Proceedings of NCC, vol. 47, AFIPS Press, 1978, pp. 1127–1129. 570. R.H. Follett, letter to NIST regarding DSS, 25 Nov 1991. 571. R. Forré, “The Strict Avalanche Criterion: Spectral Properties and an Extended Definition,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 450–468. 572. R. Forré, “A Fast Correlation Attack on Nonlinearity Feedforward Filtered Shift Register Sequences,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 568–595. 573. S. Fortune and M. Merritt, “Poker Protocols,” Advances in Cryptology: Proceedings of CRYPTO 84, Springer–Verlag, 1985, pp. 454–464. 574. R.B. Fougner, “Public Key Standards and Licenses,” RFC 1170, Jan 1991. 575. Y. Frankel and M. Yung, “Escrowed Encryption Systems Visited: Threats, Attacks, Analysis and Designs,” Advances in Cryptology—CRYPTO ’95 Proceedings, Springer–Verlag, 1995, to appear. 576. W.F. Friedman, Methods for the Solution of Running–Key Ciphers, Riverbank Publication No. 16, Riverbank Labs, 1918. 577. W.F. Friedman, The Index of Coincidence and Its Applications in Cryptography, Riverbank Publication No. 22, Riverbank Labs, 1920. Reprinted by Aegean Park Press, 1987. 578. W.F. Friedman, Elements of Cryptanalysis, Laguna Hills, CA: Aegean Park Press, 1976. 579. W.F. Friedman, “Cryptology,” Encyclopedia Britannica, v. 6, pp. 844–851, 1967. 580. A.M. Frieze, J. Hastad, R. Kannan, J.C. Lagarias, and A. Shamir, “Reconstructing Truncated Integer Variables Satisfying Linear Congruences,” SIAM Journal on Computing, v. 17, n. 2, Apr 1988, pp. 262–280. 581. A.M. Frieze, R. Kannan, and J.C. Lagarias, “Linear Congruential Generators Do not Produce Random Sequences,” Proceedings of the 25th IEEE Symposium on Foundations of Computer Science, 1984, pp. 480–484. 582. E. Fujiaski and T. Okamoto, “On Comparison...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online