applied cryptography - protocols, algorithms, and source code in c

2139 486 y desmedt and am odlykzo a chosen text attack

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 319–327. 340. D. Chaum and T. Pedersen, “Transferred Cash Grows in Size,” Advances in Cryptology—EUROCRYPT ’92 Proceedings, Springer–Verlag, 1993, pp. 391–407. 341. D. Chaum and T. Pedersen, “Wallet Databases with Observers,” Advances in Cryptology—CRYPTO ’92 Proceedings, Springer–Verlag, 1993, pp. 89–105. 342. D. Chaum and I. Schaumuller–Bichel, eds., Smart Card 2000, North Holland: Elsevier Science Publishers, 1989. 343. D. Chaum and H. van Antwerpen, “Undeniable Signatures,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 212–216. 344. D. Chaum, E. van Heijst, and B. Pfitzmann, “Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 470–484. 345. T.M. Chee, “The Cryptanalysis of a New Public–Key Cryptosystem Based on Modular Knapsacks,” Advances in Cryptology—CRYPTO ’91 Proceedings, Springer–Verlag, 1992, pp. 204–212. 346. L. Chen, “Oblivious Signatures,” Computer Security—ESORICS 94, Springer–Verlag, 1994, pp. 161–172. 347. L. Chen and M. Burminster, “A Practical Secret Voting Scheme which Allows Voters to Abstain,” CHINACRYPT ’94, Xidian, China, 11–15 Nov 1994, pp. 100–107. 348. L. Chen and T.P. Pedersen “New Group Signature Schemes,” Advances in Cryptology—EUROCRYPT ’94 Proceedings, Springer–Verlag, 1995, to appear. 349. J. Chenhui, “Spectral Characteristics of Partially–Bent Functions,” CHINACRYPT ’94, Xidian, China, 11–15 Nov 1994, pp. 48–51. 350. V. Chepyzhov and B. Smeets, “On a Fast Correlation Attack on Certain Stream Ciphers,” Advances in Cryptology—EUROCRYPT ’91 Proceedings, Springer–Verlag, 1991, pp. 176–185. 351. T.C. Cheung, “Management of PEM Public Key Certificates Using X.500 Directory Service: Some Problems and Solutions,” Proceedings of the Internet Society 1994 Workshop on Network and D...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online