applied cryptography - protocols, algorithms, and source code in c

171181 1489 b snow multiple independent binary bit

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ience, 1982, pp. 153–159. 1252. R. Poet, “The Design of Special Purpose Hardware to Factor Large Integers,” Computer Physics Communications, v. 37, 1985, pp. 337–341. 1253. S.C. Pohlig and M.E. Hellman, “An Improved Algorithm for Computing Logarithms in GF(p) and Its Cryptographic Significance,” IEEE Transactions on Information Theory, v. 24, n. 1, Jan 1978, pp. 106–111. 1254. J.M. Pollard, “A Monte Carlo Method for Factorization,” BIT, v. 15, 1975, pp. 331–334. 1255. J.M. Pollard and C.P. Schnorr, “An Efficient Solution of the Congruence x2 + ky2 = m (mod n),” IEEE Transactions on Information Theory, v. IT–33, n. 5, Sep 1987, pp. 702–709. 1256. C. Pomerance, “Recent Developments in Primality Testing,” The Mathematical Intelligencer, v. 3, n. 3, 1981, pp. 97–105. 1257. C. Pomerance, “The Quadratic Sieve Factoring Algorithm,” Advances in Cryptology: Proceedings of EUROCRYPT 84, Springer–Verlag, 1985, 169–182. 1258. C. Pomerance, “Fast, Rigorous Factorization and Discrete Logarithm Algorithms,” Discrete Algorithms and Complexity, New York: Academic Press, 1987, pp. 119–143. 1259. C. Pomerance, J.W. Smith, and R. Tuler, “A Pipe–Line Architecture for Factoring Large Integers with the Quadratic Sieve Algorithm,” SIAM Journal on Computing, v. 17, n. 2, Apr 1988, pp. 387–403. 1260. G.J. Popek and C.S. Kline, “Encryption and Secure Computer Networks,” ACM Computing Surveys, v. 11, n. 4, Dec 1979, pp. 331–356. 1261. F. Pratt, Secret and Urgent, Blue Ribbon Books, 1942. 1262. B. Preneel, “Analysis and Design of Cryptographic Hash Functions,” Ph.D. dissertation, Katholieke Universiteit Leuven, Jan 1993. 1263. B. Preneel, “Differential Cryptanalysis of Hash Functions Based on Block Ciphers,” Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993, pp. 183–188. 1264. B. Preneel, “Cryptographic Hash Functions,” European Transactions on Telecommunications, v 5, n. 4, Jul/Aug 1994, pp...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online