applied cryptography - protocols, algorithms, and source code in c

17 n 2 apr 1988 pp 281308 629 s goldwasser s micali

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ven Workshop on Cryptographic Algorithms, Springer–Verlag, 1995, to appear. 472. B. Dodson and A.K. Lenstra, “NFS with Four Large Primes: An Explosive Experiment,” draft manuscript. 473. D. Dolev and A. Yao, “On the Security of Public–Key Protocols,” Communications of the ACM, v. 29, n. 8, Aug 1983, pp. 198–208. 474. J. Domingo–Ferrer, “Probabilistic Authentication Analysis,” CARDIS 94—Proceedings of the First Smart Card Research and Applications Conference, Lille, France, 24–26 Oct 1994, pp. 49–60. 475. P. de Rooij, “On the Security of the Schnorr Scheme Using Preprocessing,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 71–80. 476. A. De Santis, G. Di Crescenzo, and G. Persiano, “Secret Sharing and Perfect Zero Knowledge,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 73–84. 477. A. De Santis, S. Micali, and G. Persiano, “Non–Interactive Zero–Knowledge Proof Systems,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 52–72. 478. A. De Santis, S. Micali, and G. Persiano, “Non–Interactive Zero–Knowledge with Preprocessing,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 269–282. 479. Y. Desmedt, “What Happened with Knapsack Cryptographic Schemes” Performance Limits in Communication, Theory and Practice, NATO ASI Series E: Applied Sciences, v. 142, Kluwer Academic Publishers, 1988, pp. 113–134. 480. Y. Desmedt, “Subliminal–Free Authentication and Signature,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, pp. 23–33. 481. Y. Desmedt, “Abuses in Cryptography and How to Fight Them,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 375–389. 482. Y. Desmedt and M. Burmester, “An Efficient Zero–Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers,” Advances in Cryptology— ASIACRYPT ’91 Proceedings, Springer–Verlag, 1993, pp. 360–367. 483. Y...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online