applied cryptography - protocols, algorithms, and source code in c

Applied cryptography protocols algorithms and source code in c

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: h to Block Cipher Design,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer–Verlag, 1994, pp. 18–32. 411. Z.–D. Dai, “Proof of Rueppel’s Linear Complexity Conjecture,” IEEE Transactions on Information Theory, v. IT–32, n. 3, May 1986, pp. 440–443. 412. I.B. Damgård, “Collision Free Hash Functions and Public Key Signature Schemes,” Advances in Cryptology—EUROCRYPT ’87 Proceedings, Springer–Verlag, 1988, pp. 203–216. 413. I.B. Damgård, “Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 328–335. 414. I.B. Damgård, “A Design Principle for Hash Functions,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 416–427. 415. I.B. Damgård, “Practical and Provably Secure Release of a Secret and Exchange of Signatures,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 200–217. 416. I.B. Damgård and L.R. Knudsen, “The Breaking of the AR Hash Function,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 286–292. 417. I.B. Damgård and P. Landrock, “Improved Bounds for the Rabin Primality Test,” Cryptography and Coding III, M.J. Ganley, ed., Oxford: Clarendon Press, 1993, pp. 117–128. 418. I.B. Damgård, P. Landrock and C. Pomerance, “Average Case Error Estimates for the Strong Probable Prime Test,” Mathematics of Computation, v. 61, n. 203, Jul 1993, pp. 177–194. 419. H.E. Daniels, Jr., letter to Datapro Research Corporation regarding CCEP, 23 Dec 1985. 420. H. Davenport, The Higher Arithmetic, Dover Books, 1983. 421. G.I. Davida, “Inverse of Elements of a Galois Field,” Electronics Letters, v. 8, n. 21, 19 Oct 1972, pp. 518–520. 422. G.I. Davida, “Hellman’s Scheme Breaks DES in Its Basic Form,” IEEE Spectrum, v. 16, n. 7, Jul 1979, p. 39. 423. G.I. Davida, “Chosen Signature Cryptanalysis of the RSA (MIT) Public Key Cryptosystem,” Technical Report TR–CS–82–2, Department of EECS, Un...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online