applied cryptography - protocols, algorithms, and source code in c

1617 mc wunderlich recent advances in the design and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: se des Data Encryption Standard und Synthese Verwandter Chiffriersysteme,” Ph.D. dissertation, Linz University, May 1981. (In German.) 1382. Schaumuller–Bichl, “On the Design and Analysis of New Cipher Systems Related to the DES,” Technical Report, Linz University, 1983. 1383. A. Scherbius, “Ciphering Machine,” U.S. Patent #1,657,411, 24 Jan 1928. 1384. J.I. Schiller, “Secure Distributed Computing,” Scientific American, v. 271, n. 5, Nov 1994, pp. 72–76. 1385. R. Schlafly, “Complaint Against Exclusive Federal Patent License,” Civil Action File No. C–93 20450, United States District Court for the Northern District of California. 1386. B. Schneier, “One–Way Hash Functions,” Dr. Dobb’s Journal, v. 16, n. 9, Sep 1991, pp. 148–151. 1387. B. Schneier, “Data Guardians,” MacWorld, v. 10, n. 2, Feb 1993, pp. 145–151. 1388. B. Schneier, “Description of a New Variable–Length Key, 64–Bit Block Cipher (Blowfish),” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 191–204. 1389. B. Schneier, “The Blowfish Encryption Algorithm,” Dr. Dobb’s Journal, v. 19, n. 4, Apr 1994, pp. 38–40. 1390. B. Schneier, Protect Your Macintosh, Peachpit Press, 1994. 1391. B. Schneier, “Designing Encryption Algorithms for Real People,” Proceedings of the 1994 ACM SIGSAC New Security Paradigms Workshop, IEEE Computer Society Press, 1994, pp. 63–71. 1392. B. Schneier, “A Primer on Authentication and Digital Signatures,” Computer Security Journal, v. 10, n. 2, 1994, pp. 38–40. 1393. B. Schneier, “The GOST Encryption Algorithm,” Dr. Dobb’s Journal, v. 20, n. 1, Jan 95, pp. 123–124. 1394. B. Schneier, E–Mail Security (with PGP and PEM) New York: John Wiley & Sons, 1995. 1395. C.P. Schnorr, “On the Construction of Random Number Generators and Random Function Generators,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, pp. 225–232. 1396. C.P. Schnorr, “Efficient Signature Generation for Smart Cards,” Advances in Cryptology—CRYPTO ’89 Proceedings,...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online