applied cryptography - protocols, algorithms, and source code in c

15 n 1 1982 pp 102116 1632 k yiu and k peterson a

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Springer–Verlag, 1990, pp. 239–252. 1397. C.P. Schnorr, “Efficient Signature Generation for Smart Cards,” Journal of Cryptology, v. 4, n. 3, 1991, pp. 161–174. 1398. C.P. Schnorr, “Method for Identifying Subscribers and for Generating and Verifying Electronic Signatures in a Data Exchange System,” U.S. Patent #4,995,082, 19 Feb 1991. 1399. C.P. Schnorr, “An Efficient Cryptographic Hash Function,” presented at the rump session of CRYPTO ’91, Aug 1991. 1400. C.P. Schnorr, “FFT–Hash II, Efficient Cryptographic Hashing,” Advances in Cryptology—EUROCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 45–54. 1401. C.P. Schnorr and W. Alexi, “RSA–bits are 0.5 + e Secure,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, pp. 113–126. 1402. C.P. Schnorr and S. Vaudenay, “Parallel FFT–Hashing,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 149–156. 1403. C.P. Schnorr and S. Vaudenay, “Black Box Cryptanalysis of Hash Networks Based on Multipermutations,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 1404. W. Schwartau, Information Warfare: Chaos on the Electronic Superhighway, New York: Thunders Mouth Press, 1994. 1405. R. Scott, “Wide Open Encryption Design Offers Flexible Implementations,” Cryptologia, v. 9, n. 1, Jan 1985, pp. 75–90. 1406. J. Seberry, “A Subliminal Channel in Codes for Authentication without Secrecy,” Ars Combinatorica, v. 19A, 1985, pp. 337–342. 1407. J. Seberry and J. Pieprzyk, Cryptography: An Introduction to Computer Security, Englewood Cliffs, N.J.: Prentice–Hall, 1989. 1408. J. Seberry, X.–M. Zhang, and Y. Zheng, “Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1994, pp. 49–60. 1409. H. Sedlack, “The RSA Cryptography Processor: The First High Speed One–...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online