{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

applied cryptography - protocols, algorithms, and source code in c

16731683 1300 t renji on finite automaton onekey

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: S.B. Freedman, “The Interrogator: Protocol Security Analysis,” IEEE Transactions on Software Engineering, v. SE–13, n. 2, Feb 1987, pp. 274–288. 1093. G.L. Miller, “Riemann’s Hypothesis and Tests for Primality,” Journal of Computer Systems Science, v. 13, n. 3, Dec 1976, pp. 300–317. 1094. S.P. Miller, B.C. Neuman, J.I. Schiller, and J.H. Saltzer, “Section E.2.1: Kerberos Authentication and Authorization System,” MIT Project Athena, Dec 1987. 1095. V.S. Miller, “Use of Elliptic Curves in Cryptography,” Advances in Cryptology—CRYPTO ’85 Proceedings, Springer–Verlag, 1986, pp. 417–426. 1096. M. Minsky, Computation: Finite and Infinite Machines, Englewood Cliffs, NJ: Prentice–Hall, 1967. 1097. C.J. Mitchell, “Authenticating Multi–Cast Internet Electronic Mail Messages Using a Bidirectional MAC Is Insecure,” draft manuscript, 1990. 1098. C.J. Mitchell, “Enumerating Boolean Functions of Cryptographic Significance,” Journal of Cryptology, v. 2, n. 3, 1990, pp. 155–170. 1099. C.J. Mitchell, F. Piper, and P. Wild, “Digital Signatures,” Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1991, pp. 325–378. 1100. C.J. Mitchell, M. Walker, and D. Rush, “CCITT/ISO Standards for Secure Message Handling,” IEEE Journal on Selected Areas in Communications, v. 7, n. 4, May 1989, pp. 517–524. 1101. S. Miyaguchi, “Fast Encryption Algorithm for the RSA Cryptographic System,” Proceedings of Compcon 82, IEEE Press, pp. 672–678. 1102. S. Miyaguchi, “The FEAL–8 Cryptosystem and Call for Attack,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 624–627. 1103. S. Miyaguchi, “Expansion of the FEAL Cipher,” NTT Review, v. 2, n. 6, Nov 1990. 1104. S. Miyaguchi, “The FEAL Cipher Family,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 627–638. 1105. S. Miyaguchi, K. Ohta, and M. Iwata, “128–bit Hash Function (N–...
View Full Document

{[ snackBarMessage ]}