applied cryptography - protocols, algorithms, and source code in c

233237 cryptosystem security 234235 entropy and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ations Magazine, v. 16, n. 6, Nov 1978, pp. 53–55. 1553. B. Vallée, M. Girault, and P. Toffin, “How to Break Okamoto’s Cryptosystem by Reducing Lattice Values,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, p. 281–291. 1554. H. Van Antwerpen, “Electronic Cash,” Master’s thesis, CWI, Netherlands, 1990. 1555. K. Van Espen and J. Van Mieghem, “Evaluatie en Implementatie van Authentiseringsalgoritmen,” graduate thesis, ESAT Laboratorium, Katholieke Universiteit Leuven, 1989. (In Dutch.) 1556. P.C. van Oorschot, “Extending Cryptographic Logics of Belief to Key Agreement Protocols,” Proceedings of the 1st Annual ACM Conference on Computer and Communications Security, 1993, pp. 232–243. 1557. P.C. van Oorschot, “An Alternate Explanation for Two BAN–logic ‘Failures,’” Advances in Cryptology—EUROCRYPT ’93 Proceedings, Springer–Verlag, 1994, pp. 443–447. 1558. P.C. van Oorschot and M.J. Wiener, “A Known–Plaintext Attack on Two–Key Triple Encryption,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 318–325. 1559. J. van Tilburg, “On the McEliece Cryptosystem,” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 119–131. 1560. J. van Tilburg, “Cryptanalysis of the Xinmei Digital Signature Scheme,” Electronics Letters, v. 28, n. 20, 24 Sep 1992, pp. 1935–1938. 1561. J. van Tilburg, “Two Chosen–Plaintext Attacks on the Li Wang Joing Authentication and Encryption Scheme,” Applied Algebra, Algebraic Algorithms and Error Correcting Codes 10, Springer–Verlag, 1993, pp. 332–343. 1562. J. van Tilburg, “Security–Analysis of a Class of Cryptosystems Based on Linear Error–Correcting Codes,” Ph.D. dissertation, Technical University Eindhoven, 1994. 1563. A. Vandemeulebroecke, E. Vanzieleghem, T. Denayer, and P.G. Jespers, “A Single Chip 1024 Bits RSA Processor,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 219–236. 1564. J. Vanderwalle, D. Chaum, W. Fumy, C. Jansen, P. Landrock, and G. Roelofsen, “A European Call for Cryptographic Algorithms: RIPE; RACE Integrity Primitives Evaluation,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 267–271. 1565. V. Varadharajan, “Verification of Network Security Protocols,” Computers and Security., v. 8, n. 8, Aug 1989, pp. 693–708. 1566. V. Varadharajan, “Use of a Formal...
View Full Document

Ask a homework question - tutors are online