applied cryptography - protocols, algorithms, and source code in c

1502 a stevens hacks spooks and data encryption dr

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: . 431–448. 1265. B. Preneel, personal communication, 1995. 1266. B. Preneel, A. Bosselaers, R. Govaerts, and J. Vandewalle, “Collision–Free Hash Functions Based on Block Cipher Algorithms,” Proceedings of the 1989 Carnahan Conference on Security Technology, 1989, pp. 203–210. 1267. B. Preneel, R. Govaerts, and J. Vandewalle, “An Attack on Two Hash Functions by Zheng–Matsumoto–Imai,” Advances in Cryptology—ASIACRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 535–538. 1268. B. Preneel, R. Govaerts, and J. Vandewalle, “Hash Functions Based on Block Ciphers: A Synthetic Approach,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 368–378. 1269. B. Preneel, M. Nuttin, V. Rijmen, and J. Buelens, “Cryptanalysis of the CFB mode of the DES with a Reduced Number of Rounds,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 212–223. 1270. B. Preneel and V. Rijmen, “On Using Maximum Likelihood to Optimize Recent Cryptanalytic Techniques,” presented at the rump session of EUROCRYPT ’94, May 1994. 1271. B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts, and J. Vandewalle, “Propagation Characteristics of Boolean Functions,” Advances in Cryptology— EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 161–173. 1272. W.H. Press, B.P. Flannery, S.A. Teukolsky, and W.T. Vetterling, Numerical Recipes in C: The Art of Scientific Computing, Cambridge University Press, 1988. 1273. W. Price, “Key Management for Data Encipherment,” Security: Proceedings of IFIP/SEC ’83, North Holland: Elsevier Science Publishers, 1983. 1274. G.P. Purdy, “A High–Security Log–in Procedure,” Communications of the ACM, v. 17, n. 8, Aug 1974, pp. 442–445. 1275. J.–J. Quisquater, “Announcing the Smart Card with RSA Capability,” Proceedings of the Conference: IC Cards and Applications, Today and Tomorrow, Amsterdam, 1989. 1276. J.–J. Quisquater and C. Couvreur, “Fast Decipherment Algorithm for RSA Public–Key Cryptosystem,” Electronic Lette...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online