applied cryptography - protocols, algorithms, and source code in c

1987 review 268269 1993 review 269270 outline of

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: hically Secure,” Proceedings of the 28th Symposium on Foundations of Computer Science, 1987, pp. 421–426. 1501. J. Stern, “A New Identification Scheme Based on Syndrome Decoding,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 13–21. 1502. A. Stevens, “Hacks, Spooks, and Data Encryption,” Dr. Dobb’s Journal, v. 15, n. 9, Sep 1990, pp. 127–134, 147–149. 1503. R. Struik, “On the Rao–Nam Private–Key Cryptosystem Using Non–Linear Codes,” IEEE 1991 Symposium on Information Theory, Budapest, Hungary, 1991. 1504. R. Struik and J. van Tilburg, “The Rao–Nam Scheme Is Insecure against a Chosen–Plaintext Attack,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 445–457. 1505. S.G. Stubblebine and V.G. Gligor, “Protecting the Integrity of Privacy–Enhanced Mail with DES–Based Authentication Codes,” Proceedings of the Privacy and Security Research Group 1993 Workshop on Network and Distributed System Security, The Internet Society, 1993, pp. 75–80. 1506. R. Sugarman, “On Foiling Computer Crime,” IEEE Spectrum, v. 16, n. 7, Jul 79, pp. 31–32. 1507. H.N. Sun and T. Hwang, “Public–key ID–Based Cryptosystem,” Proceedings of the 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan, 1–3 Oct 1991, pp. 142–144. 1508. P.F. Syverson, “Formal Semantics for Logics of Computer Protocols,” Proceedings of the Computer Security Foundations Workshop III, IEEE Computer Society Press, 1990, pp. 32–41. 1509. P.F. Syverson, “The Use of Logic in the Analysis of Cryptographic Protocols,” Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp. 156–170. 1510. P.F. Syverson, “Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols,” Journal of Computer Security, v. 1, n. 3, 1992, pp. 317–334. 1511. P.F. Syverson, “Adding Time to a Logic Authentication,” 1st ACM Conference on Computer and Communications Security, ACM Press, 1993, pp. 97–106. 1512. P.F. Syverson and C.A. Meadows, “A Logical Language for Specifying Cryptographic Protocol Requirements,” Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993, pp. 14–28. 1513. P.F. Syverson and C.A. Meadows, “Formal Requirements for Key Distribution Protocols,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag,...
View Full Document

Ask a homework question - tutors are online