applied cryptography - protocols, algorithms, and source code in c

159165 280 m burmester and y desmedt broadcast

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Verlag, 1991, pp. 169–176. 149. T. Beth and C. Ding, “On Almost Nonlinear Permutations,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 65–76. 150. T. Beth, M. Frisch, and G.J. Simmons, eds., Lecture Notes in Computer Science 578; Public Key Cryptography: State of the Art and Future Directions, Springer–Verlag, 1992. 151. T. Beth and F.C. Piper, “The Stop–and–Go Generator,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1984, pp. 88–92. 152. T. Beth and F. Schaefer, “Non Supersingular Elliptic Curves for Public Key Cryptosystems,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 316–327. 153. A. Beutelspacher, “How to Say ‘No’,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 491–496. 154. J. Bidzos, letter to NIST regarding DSS, 20 Sep 1991. 155. J. Bidzos, personal communication, 1993. 156. P. Bieber, “A Logic of Communication in a Hostile Environment,” Proceedings of the Computer Security Foundations Workshop III, IEEE Computer Society Press, 1990, pp. 14–22. 157. E. Biham, “Cryptanalysis of the Chaotic–Map Cryptosystem Suggested at EUROCRYPT ’91,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer– Verlag, 1991, pp. 532–534. 158. E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys,” Technical Report #753, Computer Science Department, Technion—Israel Institute of Technology, Sep 1992. 159. E. Biham, “On the Applicability of Differential Cryptanalysis to Hash Functions,” lecture at EIES Workshop on Cryptographic Hash Functions, Mar 1992. 160. E. Biham, personal communication, 1993. 161. E. Biham, “Higher Order Differential Cryptanalysis,” unpublished manuscript, Jan 1994. 162. E. Biham, “On Modes of Operation,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 116–120. 163. E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys,” Journal of Cryptol...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online