applied cryptography - protocols, algorithms, and source code in c

16 n 7 jul 1979 p 39 229 dk branstad j gait and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A Mathematical Model,” Report MTR–2547, MITRE Corp., 1973. 102. D.E. Bell and L.J. LaPadula, “Secure Computer Systems: A Refinement of the Mathematical Model,” Report ESDTR–73–278, MITRE Corp., 1974. 103. D.E. Bell and L.J. LaPadula, “Secure Computer Systems: Unified Exposition and Multics Interpretation,” Report ESD–TR–75–306, MITRE Corp., 1976. 104. M. Bellare and S. Goldwasser, “New Paradigms for Digital Signatures and Message Authentication Based on Non–Interactive Zero Knowledge Proofs,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 194–211. 105. M. Bellare and S. Micali, “Non–Interactive Oblivious Transfer and Applications,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 547–557. 106. M. Bellare, S. Micali, and R. Ostrovsky, “Perfect Zero–Knowledge in Constant Rounds,” Proceedings of the 22nd ACM Symposium on the Theory of Computing, 1990, pp. 482–493. 107. S.M. Bellovin, “A Preliminary Technical Analysis of Clipper and Skipjack,” unpublished manuscript, 20 Apr 1993. 108. S.M. Bellovin and M. Merritt, “Limitations of the Kerberos Protocol,” Winter 1991 USENIX Conference Proceedings, USENIX Association, 1991, pp. 253–267. 109. S.M. Bellovin and M. Merritt, “Encrypted Key Exchange: Password–Based Protocols Secure Against Dictionary Attacks,” Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, 1992, pp. 72–84. 110. S.M. Bellovin and M. Merritt, “An Attack on the Interlock Protocol When Used for Authentication,” IEEE Transactions on Information Theory, v. 40, n. 1, Jan 1994, pp. 273–275. 111. S.M. Bellovin and M. Merritt, “Cryptographic Protocol for Secure Communications,” U.S. Patent #5,241,599, 31 Aug 93. 112. I. Ben–Aroya and E. Biham, “Differential Cryptanalysis of Lucifer,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 187–199. 113. J.C. Benaloh, “Cr...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online