applied cryptography - protocols, algorithms, and source code in c

193196 1131 y murakami and s kasahara an idbased key

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Hash Functions Based on Block Ciphers,” Advances in Cryptology—EUROCRYPT ’92 Proceedings, Springer–Verlag, 1992, pp. 55–70. 931. X. Lai, J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 17–38. 932. X. Lai, R.A. Rueppel, and J. Woollven, “A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers,” Advances in Cryptology—AUSCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 339–348. 933. C.S. Laih, J.Y. Lee, C.H. Chen, and L. Harn, “A New Scheme for ID–based Cryptosystems and Signatures,” Journal of the Chinese Institute of Engineers, v. 15, n. 2, Sep 1992, pp. 605–610. 934. B.A. LaMacchia and A.M. Odlyzko, “Computation of Discrete Logarithms in Prime Fields,” Designs, Codes, and Cryptography, v. 1, 1991, pp. 46–62. 935. L. Lamport, “Password Identification with Insecure Communications,” Communications of the ACM, v. 24, n. 11, Nov 1981, pp. 770–772. 936. S. Landau, “Zero–Knowledge and the Department of Defense,” Notices of the American Mathematical Society, v. 35, n. 1, Jan 1988, pp. 5–12. 937. S. Landau, S. Kent, C. Brooks, S. Charney, D. Denning, W. Diffie, A. Lauck, D. Mikker, P. Neumann, and D. Sobel, “Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy,” Report of a Special Panel of the ACM U.S. Public Policy Committee (USACM), Association for Computing Machinery, Jun 1994. 938. S.K. Langford and M.E. Hellman, “Cryptanalysis of DES,” presented at 1994 RSA Data Security conference, Redwood Shores, CA, 12–14 Jan 1994. 939. D. Lapidot and A. Shamir, “Publicly Verifiable Non–Interactive Zero–Knowledge Proofs,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 353–365. 940. A.V. Le, S.M. Matyas, D.B. Johnson, and J.D. Wilkins, “A Public–Key Extension to the Common Cryptographic Architecture,” IBM Systems Journal, v. 32, n. 3, 1993, pp. 461–485. 941. P. L...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online