applied cryptography - protocols, algorithms, and source code in c

191204 1389 b schneier the blowfish encryption

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 405–411. 1170. V. Niemi and A. Renvall, “How to Prevent Buying of Voters in Computer Elections,” Advances in Cryptology—ASIACRYPT ’94 Proceedings, Springer–Verlag, 1995, pp. 164–170. 1171. I. Niven and H.A. Zuckerman, An Introduction to the Theory of Numbers, New York: John Wiley & Sons, 1972. 1172. R. Nöbauer, “Cryptanalysis of the Rédei Scheme,” Contributions to General Algebra 3: Proceedings of the Vienna Conference, Verlag Hölder–Pichler–Tempsky, Vienna, 1985, pp. 255–264. 1173. R. Nöbauer, “Cryptanalysis of a Public–Key Cryptosystem Based on Dickson–Polynomials,” Mathematica Slovaca, v. 38, n. 4, 1988, pp. 309–323. 1174. K. Noguchi, H. Ashiya, Y. Sano, and T. Kaneko, “A Study on Differential Attack of MBAL Cryptosystem,” Proceedings of the 1994 Symposium on Cryptography and Information Security (SCIS 94), Lake Biwa, Japan, 27–29 Jan 1994, pp. 14B.1–7. (In Japanese.) 1175. H. Nurmi, A. Salomaa, and L. Santean, “Secret Ballot Elections in Computer Networks,” Computers & Security, v. 10, 1991, pp. 553–560. 1176. K. Nyberg, “Construction of Bent Functions and Difference Sets,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 151–160. 1177. K. Nyberg, “Perfect Nonlinear S–Boxes,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 378–386. 1178. K. Nyberg, “On the Construction of Highly Nonlinear Permutations,” Advances in Cryptology—EUROCRYPT ’92 Proceedings, Springer–Verlag, 1991, pp. 92–98. 1179. K. Nyberg, “Differentially Uniform Mappings for Cryptography,” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 55–64. 1180. K. Nyberg, “Provable Security against Differential Cryptanalysis,” presented at the rump session of Eurocrypt ’94, May 1994. 1181. K. Nyberg and L.R. Knudsen, “Provable Security against Differential Cryptanalysis,” Adva...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online