applied cryptography - protocols, algorithms, and source code in c

1514 pf syverson and pc van oorschot on unifying some

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: rs, v. 18, 1982, pp. 155–168. 1277. J.–J. Quisquater and J.–P. Delescaille, “Other Cycling Tests for DES,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 255–256. 1278. J.–J. Quisquater and Y.G. Desmedt, “Chinese Lotto as an Exhaustive Code–Breaking Machine,” Computer, v. 24, n. 11, Nov 1991, pp. 14–22. 1279. J.–J. Quisquater and M. Girault, “2n–bit Hash Functions Using n–bit Symmetric Block Cipher Algorithms, Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 102–109. 1280. J.–J. Quisquater and L.C. Guillou, “Des Procédés d’Authentification Basés sur une Publication de Probl•mes Complexes et Personnalisés dont les Solutions Maintenues Secr•tes Constituent autant d’Accréditations,” Proceedings of SECURICOM ’89: 7th Worldwide Congress on Computer and Communications Security and Protection, Société d’Édition et d’Organisation d’Expositions Professionnelles, 1989, pp. 149–158. (In French.) 1281. J.–J., Myriam, Muriel, and Micha‘l Quisquater; L., Marie Annick, Ga•d, Anna, Gwenolé, and Soazig Guillou; and T. Berson, “How to Explain Zero–Knowledge Protocols to Your Children,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 628–631. 1282. M.O. Rabin, “Digital Signatures,” Foundations of Secure Communication, New York: Academic Press, 1978, pp. 155–168. 1283. M.O. Rabin, “Digital Signatures and Public–Key Functions as Intractable as Factorization,” MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR–212, Jan 1979. 1284. M.O. Rabin, “Probabilistic Algorithm for Testing Primality,” Journal of Number Theory, v. 12, n. 1, Feb 1980, pp. 128– 138. 1285. M.O. Rabin, “Probabilistic Algorithms in Finite Fields,” SIAM Journal on Computing, v. 9, n. 2, May 1980, pp. 273–280. 1286. M.O. Rabin, “How to Exchange Secrets by Oblivious Transfer,” Technical Memo TR–81, Aike...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online