applied cryptography - protocols, algorithms, and source code in c

231236 192 kj blow and sjd phoenix on a fundamental

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ferential–Linear Cryptanalysis of FEAL–8,” Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24–27 Jan 1995, pp. A3.4.1–11. (In Japanese.) 63. K. Araki and T. Sekine, “On the Conspiracy Problem of the Generalized Tanaka’s Cryptosystem,” IEICE Transactions, v. E74, n. 8, Aug 1991, pp. 2176–2178. 64. S. Araki, K. Aoki, and K. Ohta, “The Best Linear Expression Search for FEAL,” Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24–27 Jan 1995, pp. A4.4.1–10. 65. C. Asmuth and J. Bloom, “A Modular Approach to Key Safeguarding,” IEEE Transactions on Information Theory, v. IT–29, n. 2, Mar 1983, pp. 208–210. 66. D. Atkins, M. Graff, A.K. Lenstra, and P.C. Leyland, “The Magic Words are Squeamish Ossifrage,” Advances in Cryptology—ASIACRYPT ’94 Proceedings, Springer–Verlag, 1995, pp. 263–277. 67. AT&ampT, “T7001 Random Number Generator,” Data Sheet, Aug 1986. 68. AT&ampT, “AT&ampT Readying New Spy–Proof Phone for Big Military and Civilian Markets,” The Report on AT&ampT, 2 Jun 1986, pp. 6–7. 69. AT&ampT, “T7002/T7003 Bit Slice Multiplier,” product announcement, 1987. 70. AT&ampT, “Telephone Security Device TSD 3600—User’s Manual,” AT&ampT, 20 Sep 1992. 71. Y. Aumann and U. Feige, “On Message Proof Systems with Known Space Verifiers,” Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 85–99. 72. R.G. Ayoub, An Introduction to the Theory of Numbers, Providence, RI: American Mathematical Society, 1963. 73. A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Communications, v. 1, n. 1, 1994, pp. 25–31. 74. A. Bahreman and J.D. Tygar, “Certified Electronic Mail,” Proceedings of the Internet Society 1994 Workshop on Network and Distributed System Security, The Internet Society, 1994, pp. 3–19. 7...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online