applied cryptography - protocols, algorithms, and source code in c

193202 1572 i verbauwhede f hoornaert j vanderwalle

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: orces Communications and Electronics Association, paper 31, Aug 1987. 1342. J. Rompel, “One–Way Functions Are Necessary and Sufficient for Secure Signatures,” Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, 1990, pp. 387–394. 1343. T. Rosati, “A High Speed Data Encryption Processor for Public Key Cryptography,” Proceedings of the IEEE Custom Integrated Circuits Conference, 1989, pp. 12.3.1–12.3.5. 1344. O.S. Rothaus, “On ‘Bent’ Functions,” Journal of Combinational Theory, Series A, v. 20, n. 3, 1976, pp. 300–305. 1345. RSA Laboratories, “PKCS #1: RSA Encryption Standard,” version 1.5, Nov 1993. 1346. RSA Laboratories, “PKCS #3: Diffie–Hellman Key–Agreement Standard,” version 1.4, Nov 1993. 1347. RSA Laboratories, “PKCS #5: Password–Based Encryption Standard,” version 1.5, Nov 1993. 1348. RSA Laboratories, “PKCS #6: Extended–Certificate Syntax Standard,” version 1.5, Nov 1993. 1349. RSA Laboratories, “PKCS #7: Cryptographic Message Syntax Standard,” version 1.5, Nov 1993. 1350. RSA Laboratories, “PKCS #8: Private Key Information Syntax Standard,” version 1.2, Nov 1993. 1351. RSA Laboratories, “PKCS #9: Selected Attribute Types,” version 1.1, Nov 1993. 1352. RSA Laboratories, “PKCS #10: Certification Request Syntax Standard,” version 1.0, Nov 1993. 1353. RSA Laboratories, “PKCS #11: Cryptographic Token Interface Standard,” version 1.0, Apr 95. 1354. RSA Laboratories, “PKCS #12: Public Key User Information Syntax Standard,” version 1.0, 1995. 1355. A.D. Rubin and P. Honeyman, “Formal Methods for the Analysis of Authentication Protocols,” draft manuscript, 1994. 1356. F. Rubin, “Decrypting a Stream Cipher Based on J–K Flip–Flops,” IEEE Transactions on Computing, v. C–28, n. 7, Jul 1979, pp. 483–487. 1357. R.A. Rueppel, Analysis and Design of Stream Ciphers, Springer–Verlag, 1986. 1358. R.A. Rueppel, “Correlation Immunity and the Summation Combiner,” Adva...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online